RoseSecurity / DNS-FenderLinks
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
☆59Updated 3 years ago
Alternatives and similar repositories for DNS-Fender
Users that are interested in DNS-Fender are comparing it to the libraries listed below
Sorting:
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Custom pentesting tools☆26Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Updated 4 years ago
- ☆27Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- An AV exclusion enumeration tool written in Python.☆60Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- PowerShell payload generator☆120Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 4 years ago
- ChatGPT queries via OpenAI API in your terminal☆62Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated last year
- Reads and prints information from the website MalAPI.io☆39Updated 4 years ago