Deprecated - Low Orbit Ion Cannon - An open source network stress tool, written in C#. Based on Praetox's LOIC project. USE ON YOUR OWN RISK. WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. IF YOU GET V& IT IS YOUR FAULT.
☆2,943Jan 9, 2024Updated 2 years ago
Alternatives and similar repositories for LOIC
Users that are interested in LOIC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An unofficial port of Low Orbit Ion Cannon to Android☆63Sep 24, 2015Updated 10 years ago
- Low bandwidth DoS tool. Slowloris rewrite in Python.☆2,772Jun 1, 2024Updated last year
- HULK DoS tool ported to Go with some additional features.☆896Aug 3, 2023Updated 2 years ago
- UFONet - Denial of Service Toolkit☆2,447Aug 23, 2024Updated last year
- High Orbit Ion Canon DDOS Tool☆57Oct 3, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- GoldenEye Layer 7 (KeepAlive+NoCache) DoS Test Tool☆1,457Nov 16, 2023Updated 2 years ago
- Metasploit Framework☆37,850Apr 6, 2026Updated last week
- Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods☆15,755Mar 26, 2026Updated 2 weeks ago
- High Orbit Ion Cannon☆33Jul 9, 2019Updated 6 years ago
- A little tool to play with Windows security☆21,391Updated this week
- The Browser Exploitation Framework Project☆10,808Updated this week
- An open-source post-exploitation framework for students, researchers and developers.☆9,463Apr 2, 2026Updated last week
- SlamDunk's LOIC in Python☆29Dec 29, 2010Updated 15 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,836Jan 19, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PenTest Education: R-U-DEAD-YET ? DOS Attack Implementation in Node.JS☆154May 19, 2018Updated 7 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,044Updated this week
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,133Mar 17, 2024Updated 2 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,763Oct 21, 2024Updated last year
- hydra☆11,765Feb 7, 2026Updated 2 months ago
- World's fastest and most advanced password recovery utility☆25,732Feb 20, 2026Updated last month
- Remote Administration Tool for Windows☆9,785Feb 29, 2024Updated 2 years ago
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API☆1,393Dec 2, 2022Updated 3 years ago
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,960Mar 22, 2024Updated 2 years ago
- Nikto web server scanner☆10,254Updated this week
- Exploitation Framework for Embedded Devices☆13,066Mar 2, 2026Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,939Aug 17, 2020Updated 5 years ago
- This script installs, updates and runs LOIC on Linux.☆26Oct 6, 2011Updated 14 years ago
- Tor's hammer. Slow post DDOS tool written in python.☆341Apr 23, 2022Updated 3 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,213Oct 9, 2023Updated 2 years ago
- E-mails, subdomains and names Harvester - OSINT☆15,999Updated this week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,503Mar 31, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Attack Surface Management Platform☆9,650Feb 15, 2026Updated last month
- The Rogue Access Point Framework☆14,531Feb 4, 2025Updated last year
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆12,674Updated this week
- Automatic SQL injection and database takeover tool☆37,038Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,851Apr 25, 2024Updated last year
- Ghidra is a software reverse engineering (SRE) framework☆66,637Updated this week
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆12,970Updated this week