RoseSecurity / DNS-FenderLinks
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
☆59Updated 2 years ago
Alternatives and similar repositories for DNS-Fender
Users that are interested in DNS-Fender are comparing it to the libraries listed below
Sorting:
- Custom pentesting tools☆25Updated 4 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- All kinds of tiny shells☆58Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆27Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Just my findings of malwares☆43Updated 2 years ago
- ☆41Updated last year
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated last year
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆104Updated last year
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 2 weeks ago
- Malware vulnerability intel tool for third-party attackers☆119Updated 7 months ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 4 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- ☆24Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- A swiss army knife for pentesting networks☆26Updated 2 years ago
- ☆37Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆17Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- ☆17Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago