c0r0n3r / dheaterLinks
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆210Updated last year
Alternatives and similar repositories for dheater
Users that are interested in dheater are comparing it to the libraries listed below
Sorting:
- Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)☆71Updated 2 years ago
- Proof of concept for DoS exploit☆53Updated 2 years ago
- ☆85Updated 2 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆162Updated 2 months ago
- Sifter - All purpose penetration testing op-center☆81Updated 3 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆123Updated last year
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Updated 2 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago
- brute force SSH public-key authentication☆77Updated 7 months ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆56Updated 3 weeks ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated 2 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆121Updated 2 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆61Updated 4 years ago
- RUDY is an acronym used to describe a Denial of Service (DoS) tool used by hackers to perform slow-rate a.k.a. “Low and slow” attacks.☆105Updated 4 months ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 3 years ago
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perf…☆26Updated 3 years ago
- Multithread reverse shell listener☆26Updated last year
- Small tool to capture packets from Bluetooth devices.☆54Updated 2 years ago
- ☆204Updated 2 years ago
- System based on +500 blacklists to detect internet potencialy malicious hosts☆152Updated this week
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆119Updated 5 years ago
- Search GitHub for public Shodan api keys☆81Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago