c0r0n3r / dheaterLinks
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆209Updated last year
Alternatives and similar repositories for dheater
Users that are interested in dheater are comparing it to the libraries listed below
Sorting:
- Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)☆71Updated 2 years ago
- brute force SSH public-key authentication☆78Updated 6 months ago
- Proof of concept for DoS exploit☆54Updated 2 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆160Updated 3 weeks ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆61Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Complete SMS packet manipulation☆113Updated 4 years ago
- Multithread reverse shell listener☆26Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆114Updated 2 years ago
- ☆85Updated 2 years ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Pwning IPv6 Networks☆38Updated 2 months ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆149Updated 3 years ago
- Search GitHub for public Shodan api keys☆80Updated 2 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Updated last month
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆130Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆121Updated last year
- ☆63Updated 2 years ago
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆143Updated last year
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆80Updated 2 years ago
- Low Interaction Mobile Honeypot☆96Updated 6 months ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41Updated 3 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆243Updated last year
- A collection of tools created for computer security research purposes.☆134Updated 5 years ago
- ☆182Updated 2 years ago