RoseSecurity / DNS-FenderLinks
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
☆61Updated 3 years ago
Alternatives and similar repositories for DNS-Fender
Users that are interested in DNS-Fender are comparing it to the libraries listed below
Sorting:
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- Custom pentesting tools☆25Updated 4 years ago
- ☆25Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆81Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- ☆20Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- AutoPoC Generator HoneyPoC☆35Updated 6 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆64Updated 2 years ago
- URL fingerprinting made easy☆90Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- ☆80Updated 2 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Updated 4 months ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆73Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago