RoseSecurity / DNS-FenderLinks
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
☆60Updated 3 years ago
Alternatives and similar repositories for DNS-Fender
Users that are interested in DNS-Fender are comparing it to the libraries listed below
Sorting:
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Custom pentesting tools☆26Updated 5 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- ☆26Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆49Updated 7 months ago
- An AV exclusion enumeration tool written in Python.☆60Updated 3 years ago
- ChatGPT queries via OpenAI API in your terminal☆62Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- AutoPoC Generator HoneyPoC☆36Updated 2 weeks ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆80Updated last year
- Tools that trigger False Positive AV alerts☆53Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 4 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated last year
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- PowerShell payload generator☆117Updated 4 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- Left To My Own Devices - NT hash tools☆40Updated 3 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago