aelth / ddospotLinks
NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot
☆58Updated 4 years ago
Alternatives and similar repositories for ddospot
Users that are interested in ddospot are comparing it to the libraries listed below
Sorting:
- Research on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacks☆375Updated 7 months ago
- High Interaction Honeypot Solution for Redis protocol☆24Updated 4 years ago
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆69Updated this week
- packet captures of real-world ddos attacks☆163Updated last week
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆28Updated last year
- HoneyHTTPD is a Python-based web server honeypot/service imitation builder. Great for honeypots or faking HTTP services.☆50Updated last year
- A Simple Reflection and Amplification DoS Attack Tool Based on Saddam.☆28Updated 6 years ago
- Python SYN Flood Attack Tool, you can start SYN Flood attack with this tool. Simple and efficient.☆248Updated last year
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- [Random Collection of DoS Scripts, includes AMP, Dos and DDOS Scripts all the same shit lulz]☆49Updated 7 years ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆129Updated 2 years ago
- Anti-Flood: DoS, DDoS, Brute Force, SYN/UDP Flood☆24Updated 4 years ago
- Compromised SSH servers and scraped websites revealed leaked hacking tools.☆118Updated 9 months ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆183Updated 2 years ago
- DNS amplification DDOS attack tool.☆40Updated 3 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆226Updated last month
- Dns amplification attack☆22Updated 6 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 5 years ago
- Suricata rules for network anomaly detection☆165Updated 3 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 11 months ago
- A tool to perform DNS cache poisoning against vulnerable server☆33Updated last year
- Anti Ports Scanning IP/ISP List(Global Scanning Blacklist of friendly-civilized use Masscan/ZMap)☆10Updated 5 years ago
- Network Entity Reputation Database☆36Updated last month
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated 11 months ago
- Yara scan Phishing Kit's Zip archive(s)☆59Updated 3 weeks ago
- IT'S MY CODE ! DDOS Archive by D1GG3R (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)☆32Updated 5 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- 📈 A simple layer7 dstat on the web☆71Updated 3 years ago