c0r0n3r / dheaterLinks
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆205Updated last year
Alternatives and similar repositories for dheater
Users that are interested in dheater are comparing it to the libraries listed below
Sorting:
- Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)☆68Updated last year
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago
- Multithread reverse shell listener☆25Updated last year
- Proof of concept for DoS exploit☆53Updated 2 years ago
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perf…☆23Updated 3 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆159Updated 7 months ago
- Honeyscanner: A vulnerability analyzer for honeypots☆50Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆57Updated 2 years ago
- Layer 7 DDoS tool that supports sophisticated attack methods.☆26Updated 3 months ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆62Updated 4 years ago
- ☆159Updated 2 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆28Updated 7 years ago
- ☆84Updated 2 years ago
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆131Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆39Updated 2 weeks ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆150Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Sifter - All purpose penetration testing op-center☆81Updated 2 years ago
- Compromised SSH servers and scraped websites revealed leaked hacking tools.☆127Updated last year
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆134Updated last year
- Automated rogue access point setup tool.☆198Updated 4 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆44Updated 6 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago