Packet-Batch / old-dpdkLinks
Packet Batch's old DPDK program. An application that utilizes the DPDK to send network packets. Used for penetration testing including Denial of Service (DoS), and network monitoring.
☆16Updated last year
Alternatives and similar repositories for old-dpdk
Users that are interested in old-dpdk are comparing it to the libraries listed below
Sorting:
- An application that utilizes fast AF_XDP Linux sockets to generate and send network packets. Used for penetration testing including Denia…☆109Updated 9 months ago
- XDP tutorial project☆44Updated 3 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Updated 5 years ago
- very effective synproxy made in XDP and eBPF☆16Updated last year
- Build a Mirai botnet from the source code.☆43Updated 6 years ago
- A skid ripped source of the Dream qBot Botnet developed By Komodo. Leaked By Tiger. Enjoy, it comes with instructions!☆12Updated 5 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆23Updated this week
- Self hosting ipgrabber☆11Updated 3 years ago
- Anti Ports Scanning IP/ISP List(Global Scanning Blacklist of friendly-civilized use Masscan/ZMap)☆10Updated 6 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Updated 3 years ago
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆70Updated 5 months ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Updated 3 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆14Updated 5 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated 2 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Updated 4 years ago
- BGP reverse proxy☆123Updated 3 weeks ago
- GTPv1/GTPv2 Dialer☆29Updated last month
- A small to find Host Header Injection vulnerabilities in a websites☆11Updated 3 years ago
- ☄️ Fast, 100% Accurate, Anti Honeypot SSH Cracker 🔑☆15Updated 3 years ago
- For the final part of my Bachelor in Computer Science, the research project, I aim to automatically generate DDoS mitigation rules for th…☆12Updated 6 years ago
- packet captures of real-world ddos attacks☆165Updated 2 months ago
- A stateless, high-performance NAT-like proxy that attaches to the XDP hook in the Linux kernel using (e)BPF for fast packet processing. …☆259Updated last week
- A semi-automatic osint/recon framework.☆24Updated last year
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆33Updated 9 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Updated 3 years ago
- LeakIX maintained plugins implementing the l9format golang plugin interface.☆12Updated 4 years ago
- layer7 mirai private layer4 ovh bypass nfo bypass☆43Updated 3 years ago
- A look into DDoS protecting OpenVPN servers using iptables BPF☆16Updated 4 years ago