c0r0n3r / dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆197Updated 11 months ago
Alternatives and similar repositories for dheater:
Users that are interested in dheater are comparing it to the libraries listed below
- Proof of concept for DoS exploit☆54Updated last year
- A pre-DDoS security assessment tool☆120Updated 3 years ago
- Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)☆67Updated last year
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated last year
- Find exploits in local and online database☆73Updated 6 months ago
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆113Updated last year
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆44Updated 7 months ago
- Search GitHub for public Shodan api keys☆71Updated last year
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆55Updated last year
- Notus is a vulnerability scanner for creating results from local security checks☆48Updated this week
- Automated sqlmap☆21Updated 2 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 2 years ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆39Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆120Updated last month
- Installation script for Codename SCNR.☆31Updated 3 months ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆15Updated 5 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆45Updated 5 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆72Updated 3 years ago
- Layer 7 DDoS tool that supports sophisticated attack methods.☆25Updated 3 months ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆55Updated 4 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆38Updated 8 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆65Updated 3 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆31Updated 2 years ago
- Check IP addresses against known cloud provider IP address ranges☆44Updated last year
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆130Updated last year