RoseSecurity / DNS-FenderLinks
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
☆58Updated 2 years ago
Alternatives and similar repositories for DNS-Fender
Users that are interested in DNS-Fender are comparing it to the libraries listed below
Sorting:
- Malware vulnerability intel tool for third-party attackers☆122Updated 10 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- ☆24Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Tools that trigger False Positive AV alerts☆50Updated 8 months ago
- wordlists for password cracking☆28Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- AutoPoC Generator HoneyPoC☆35Updated 4 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- PowerShell payload generator☆117Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 9 months ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 3 months ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- ChatGPT queries via OpenAI API in your terminal☆62Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago