c0r0n3r / dheaterLinks
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆204Updated last year
Alternatives and similar repositories for dheater
Users that are interested in dheater are comparing it to the libraries listed below
Sorting:
- Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)☆69Updated 2 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆157Updated 8 months ago
- Proof of concept for DoS exploit☆53Updated 2 years ago
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perf…☆23Updated 3 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆110Updated 2 years ago
- Multithread reverse shell listener☆26Updated last year
- brute force SSH public-key authentication☆79Updated 5 months ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆65Updated 6 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago
- Automated rogue access point setup tool.☆199Updated 4 years ago
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆57Updated 2 years ago
- ☆158Updated 2 years ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆128Updated 2 years ago
- rwwwshell: Getting a reverse shell with Mr. Robot ;)☆35Updated 5 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆246Updated last year
- Layer 7 DDoS tool that supports sophisticated attack methods.☆26Updated 4 months ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆73Updated last year
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Deauthalyzer is a script designed to monitor WiFi networks and detect deauthentication attacks. It utilizes packet sniffing and analysis …☆59Updated 2 years ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆149Updated 3 years ago
- on-the-fly☆85Updated last year
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- RUDY is an acronym used to describe a Denial of Service (DoS) tool used by hackers to perform slow-rate a.k.a. “Low and slow” attacks.☆97Updated 2 months ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆129Updated last week
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆138Updated last year
- A pre-DDoS security assessment tool☆120Updated 4 years ago