RoseSecurity / DNS-Fender
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
☆59Updated 2 years ago
Alternatives and similar repositories for DNS-Fender:
Users that are interested in DNS-Fender are comparing it to the libraries listed below
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated last month
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated last year
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- AutoPoC Generator HoneyPoC☆35Updated 7 months ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- DEFCON 31 slide deck and video link☆58Updated 8 months ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- ☆17Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated last year
- Hashes of infamous malware☆25Updated last year
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆50Updated last month
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated this week
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated last year
- Custom pentesting tools☆24Updated 4 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆30Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆111Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 3 months ago