c0r0n3r / dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆192Updated 9 months ago
Alternatives and similar repositories for dheater:
Users that are interested in dheater are comparing it to the libraries listed below
- Proof of concept for DoS exploit☆52Updated last year
- Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)☆65Updated last year
- Fork: THC-SSL-DOS is a tool to verify the performance of SSL.☆58Updated 2 years ago
- 🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯☆44Updated 9 months ago
- Compromised SSH servers and scraped websites revealed leaked hacking tools.☆112Updated 4 months ago
- Lightweight Bash Script To Automate Some Useful Information Gathering On IP Address Using Different API's☆26Updated 2 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆107Updated last year
- Notus is a vulnerability scanner for creating results from local security checks☆45Updated this week
- DNSrecon tool with GUI for Kali Linux☆57Updated 2 years ago
- A pre-DDoS security assessment tool☆120Updated 3 years ago
- censors pose a threat to the entire Internet☆132Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆68Updated last year
- Simple DNS logging server☆18Updated 3 years ago
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆108Updated 10 months ago
- TCP port scan detection tool☆59Updated 2 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Updated 2 years ago
- A tool to perform DNS reconnaissance on target networks. Among the DNS information got from include subdomains, mx records, web applicati…☆309Updated 5 months ago
- ssb=simple subdomain bruteforcer☆18Updated last year
- Multithread reverse shell listener☆22Updated last year
- Tools for finding SMTP smuggling vulnerabilities.☆118Updated 10 months ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 2 years ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆53Updated 4 years ago
- brute force SSH public-key authentication☆75Updated 10 months ago
- ☆79Updated last year
- Bifrost C2. Open-source post-exploitation using Discord API☆46Updated 3 years ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆129Updated last year
- ☆95Updated 10 months ago
- Crawls URL to get a better image of what is tied to a website.☆32Updated last year
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- SQL Injection Tool☆44Updated 10 years ago