An Advanced Layer 7 DDoS tool
☆426Feb 13, 2026Updated last month
Alternatives and similar repositories for DDoSlayer
Users that are interested in DDoSlayer are comparing it to the libraries listed below
Sorting:
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- DOS TOOL WITH PYTHON LAYER7 :) (HTTP FLOOD)☆129Jun 2, 2024Updated last year
- Subdomain Bruteforce - Bounty Quick Code☆31Sep 6, 2024Updated last year
- One of the most powerful DDoS Tool on the planet, Highly Interactive and User friendly to use. Based on Golang/Python HULK DoS. Now with …☆145Nov 4, 2022Updated 3 years ago
- DDoS attacks over Tor☆395Jul 27, 2023Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A tool to perform DDoS attack with control panel to control your crazy zombies : )☆187Jul 5, 2022Updated 3 years ago
- Powerful DDoS Attack☆292Jul 21, 2024Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Sep 6, 2024Updated last year
- DDoS Attack & Protection Tools for Windows, Linux & Android☆276Aug 12, 2024Updated last year
- HASOKI DDOS TOOL- powerful DDoS toolkit for penetration tests☆123Dec 16, 2023Updated 2 years ago
- "Overload" is a python program that sends active connections to any target of some sort. It is used to perform a DoS/DDoS attack.☆117Jan 4, 2020Updated 6 years ago
- Asynchronous HTTP Botnet for Distributed Denial of Service (DDoS)☆461Feb 4, 2023Updated 3 years ago
- Very strong ddos with proxy.☆115Nov 16, 2025Updated 4 months ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆299Mar 9, 2026Updated last week
- Collection of several DDos tools.☆208Sep 1, 2023Updated 2 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆20May 7, 2023Updated 2 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- 🔫 Red DDoS Tool is -THE BEST- tool for DDoS attacks.☆433Mar 26, 2022Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.☆15Sep 6, 2024Updated last year
- This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.☆384Apr 4, 2021Updated 4 years ago
- Who We Are☆22Sep 6, 2024Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- LAYER7 BEST FLOODING ( SIMPLE TOOL FOR WRITE PROTECT )☆21Oct 31, 2024Updated last year
- C2 DDOS, With Method SYN, ICMP, TCP, HTTP, UDP, DNS FLOOD, Slowloris, TLS.☆30Jan 2, 2024Updated 2 years ago
- (DDos-attacker) Tool!☆137Aug 28, 2023Updated 2 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆162Oct 11, 2024Updated last year
- DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc..…☆866Jul 25, 2023Updated 2 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- Bug Bounty Tools used on Twitch - Recon☆324Sep 6, 2024Updated last year
- Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many co…☆707Dec 21, 2020Updated 5 years ago
- ZOIC V5☆79Nov 27, 2025Updated 3 months ago
- DDoS Tool using Multi-tor and Torshammer tool☆65Apr 18, 2021Updated 4 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Sep 6, 2024Updated last year