D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆213May 3, 2024Updated last year
Alternatives and similar repositories for dheater
Users that are interested in dheater are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- "Overload" is a python program that sends active connections to any target of some sort. It is used to perform a DoS/DDoS attack.☆116Jan 4, 2020Updated 6 years ago
- Collection of several DDos tools.☆212Sep 1, 2023Updated 2 years ago
- Một tập lệnh Python để DDOS một trang web bằng phương pháp HTTP Flood, một trang web bình thường chỉ cần 5s để sập hoàn toàn!☆26Apr 21, 2025Updated 11 months ago
- ☆86Dec 8, 2021Updated 4 years ago
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Most Complete Hacking Toolkit☆218May 27, 2025Updated 10 months ago
- DOS TOOL WITH PYTHON LAYER7 :) (HTTP FLOOD)☆131Jun 2, 2024Updated last year
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆15Sep 3, 2021Updated 4 years ago
- Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many co…☆712Dec 21, 2020Updated 5 years ago
- This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.☆386Apr 4, 2021Updated 5 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- A tool to perform DDoS attack with control panel to control your crazy zombies : )☆187Jul 5, 2022Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Sep 1, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆15Oct 21, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆12Feb 10, 2022Updated 4 years ago
- Một tập lệnh Python để DDOS một trang web bằng phương pháp nhiều phương pháp HTTP Flood, một trang web bình thường chỉ cần 5s để sập hoàn…☆79Apr 21, 2025Updated 11 months ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Golang httpflood(socket) can down a normal website in 10s with 100 connections☆339Aug 24, 2022Updated 3 years ago
- API for MPL Indonesia Season 10☆12Aug 18, 2023Updated 2 years ago
- Static security checker for Dockerfiles☆104Jan 29, 2026Updated 2 months ago
- A high-performance platform for running Minecraft stress-test bots written in C#.☆175Sep 28, 2025Updated 6 months ago
- PoC of five Slow Rate HTTP/2 DoS attacks seen in a research paper☆10Mar 31, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 📡 Overload DoS Tool☆427May 16, 2023Updated 2 years ago
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- Advanced Rust DDoS testing tool with Layer 4/7 attacks, Tor integration, evasion, and spoofing for security☆280Aug 6, 2025Updated 8 months ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆19Jun 6, 2024Updated last year
- This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!☆13Jun 6, 2021Updated 4 years ago
- This repository is designed to provide a comprehensive guide to Python programming, covering everything from basic concepts to advanced t…☆19May 16, 2025Updated 11 months ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- Memory dump and Sample analysis tool☆19Mar 17, 2025Updated last year
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆24Sep 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Twitter auto account report bot using selenium with python☆13Apr 19, 2024Updated 2 years ago
- Linux kernel source code for Galaxy S22. Extracted from SM-S901U_NA_12_Opensource.zip☆16Oct 7, 2022Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆86May 16, 2022Updated 3 years ago
- This is a versatile collection of scripts designed for OSINT, ethical hacking, and web application security testing. With a focus on auto…☆77Jul 10, 2024Updated last year
- A fork of thc-ssl-dos that supports all SSL/TLS implementations, UDP (using DTLS), SOCKS5 proxy and both renegotiation and reconnect atta…☆16Aug 1, 2022Updated 3 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago