RoseSecurity / DNS-FenderLinks
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
☆59Updated 3 years ago
Alternatives and similar repositories for DNS-Fender
Users that are interested in DNS-Fender are comparing it to the libraries listed below
Sorting:
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- PowerShell payload generator☆120Updated 4 years ago
- ChatGPT queries via OpenAI API in your terminal☆62Updated 2 years ago
- ☆16Updated 6 years ago
- ☆27Updated 3 years ago
- An AV exclusion enumeration tool written in Python.☆60Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- wordlists for password cracking☆28Updated 3 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50Updated 8 months ago
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- AutoPoC Generator HoneyPoC☆36Updated 2 months ago
- ☆80Updated 2 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- Custom pentesting tools☆26Updated 5 years ago
- Local Privilege Escalation Miner☆32Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆117Updated 4 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆104Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago