D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆211May 3, 2024Updated last year
Alternatives and similar repositories for dheater
Users that are interested in dheater are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of several DDos tools.☆210Sep 1, 2023Updated 2 years ago
- Một tập lệnh Python để DDOS một trang web bằng phương pháp HTTP Flood, một trang web bình thường chỉ cần 5s để sập hoàn toàn!☆26Apr 21, 2025Updated 11 months ago
- DDos-Blitz is a Distributed-Denial-of-Service script which sends multiple HTTP requests to the server using multi threading and fake IP. …☆11Oct 29, 2023Updated 2 years ago
- Socks5 Proxy HTTP/HTTPS-Flooding (cc) Test☆106May 24, 2025Updated 10 months ago
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ALL IN ONE Hacking Tool For Hackers☆41Dec 13, 2022Updated 3 years ago
- (DDos-attacker) Tool!☆140Aug 28, 2023Updated 2 years ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆15Sep 3, 2021Updated 4 years ago
- Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many co…☆709Dec 21, 2020Updated 5 years ago
- Worm/Trojan/Ransomware/apt/Rootkit/Virus Database☆100Oct 3, 2024Updated last year
- This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.☆384Apr 4, 2021Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- CyberKeyGen is a modern, secure password generator that helps you create strong, unique passwords for your accounts. Built with React and…☆42May 21, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool to perform DDoS attack with control panel to control your crazy zombies : )☆187Jul 5, 2022Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Sep 1, 2015Updated 10 years ago
- ☆15Oct 21, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Một tập lệnh Python để DDOS một trang web bằng phương pháp nhiều phương pháp HTTP Flood, một trang web bình thường chỉ cần 5s để sập hoàn…☆79Apr 21, 2025Updated 11 months ago
- Lightweight reverse phone lookup single page application built with Vue, Webpack, Babel, Element-UI, and Bootstrap 4. Using the Whitepage…☆12Sep 14, 2018Updated 7 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆135Mar 18, 2024Updated 2 years ago
- Golang httpflood(socket) can down a normal website in 10s with 100 connections☆340Aug 24, 2022Updated 3 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆75Dec 7, 2023Updated 2 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- Collection of my volatility3 plugins☆18Sep 6, 2024Updated last year
- DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Inte…☆2,742Mar 10, 2026Updated 2 weeks ago
- Payload generator to exfiltrate user cookies through the PHP info page bypassing the HttpOnly flag during XSS exploitation.☆20Dec 20, 2023Updated 2 years ago
- 📡 Overload DoS Tool☆424May 16, 2023Updated 2 years ago
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆19Jun 6, 2024Updated last year
- This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!☆13Jun 6, 2021Updated 4 years ago
- This repository is designed to provide a comprehensive guide to Python programming, covering everything from basic concepts to advanced t…☆19May 16, 2025Updated 10 months ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆22Sep 18, 2023Updated 2 years ago
- Twitter auto account report bot using selenium with python☆13Apr 19, 2024Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆60May 31, 2024Updated last year