breakerspace / weaponizing-censors
censors pose a threat to the entire Internet
☆132Updated 3 years ago
Alternatives and similar repositories for weaponizing-censors:
Users that are interested in weaponizing-censors are comparing it to the libraries listed below
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆167Updated last week
- packet captures of real-world ddos attacks☆151Updated 2 years ago
- ☆298Updated last year
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆99Updated 4 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆127Updated last year
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆108Updated 4 months ago
- SADDNS: Side Channel Based DNS Cache Poisoning Attack☆55Updated 3 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆118Updated this week
- Vault Exploit Defense☆124Updated 5 months ago
- your censor is my censor: weaponizing residual censorship to perform availability attacks☆22Updated 3 years ago
- Research on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacks☆360Updated 2 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- HTTP3-attacks (CVE-2022-30592)☆75Updated 2 years ago
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆564Updated 2 years ago
- Repository for application-layer loop DoS☆31Updated 11 months ago
- Passive DNS Capture and Monitoring Toolkit☆321Updated last week
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆68Updated 2 years ago
- IoT and Operational Technology Honeypot☆105Updated last year
- A network packet forensics tool for SSH☆255Updated 4 years ago
- Project to decrypt and parse SSH traffic☆64Updated 4 years ago
- Cisco ASA Software and ASDM Security Research☆80Updated 2 years ago
- A Passive SSH back-end and scanner.☆103Updated 8 months ago
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆192Updated 9 months ago
- ☆275Updated 2 years ago
- Utility to find hidden Linux kernel modules☆144Updated 2 months ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆129Updated last year
- SNIcat☆126Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Updated last week
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆121Updated 2 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆119Updated 2 years ago