A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
☆59Nov 14, 2022Updated 3 years ago
Alternatives and similar repositories for DNS-Fender
Users that are interested in DNS-Fender are comparing it to the libraries listed below
Sorting:
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Nov 6, 2023Updated 2 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆48Mar 8, 2023Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 9 months ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆750Oct 25, 2025Updated 4 months ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆57Jan 24, 2025Updated last year
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆222May 2, 2025Updated 10 months ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- MQTT exploit and Pentesting guide for penetration tester☆27Nov 24, 2023Updated 2 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Nov 30, 2025Updated 3 months ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆22Apr 30, 2022Updated 3 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,853Feb 3, 2026Updated last month
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- ☆11Aug 4, 2022Updated 3 years ago
- Recon tool for pen-tester's☆21Sep 9, 2021Updated 4 years ago
- 🔎 Hunt down social media accounts by username across social networks☆15Aug 3, 2023Updated 2 years ago
- 🌐 A curated list of anonymous networks & research papers☆18Oct 15, 2024Updated last year
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆12Dec 5, 2017Updated 8 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Jan 6, 2019Updated 7 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- ☆32Oct 11, 2023Updated 2 years ago