D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆213May 3, 2024Updated 2 years ago
Alternatives and similar repositories for dheater
Users that are interested in dheater are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of several DDos tools.☆210Sep 1, 2023Updated 2 years ago
- ☆86Dec 8, 2021Updated 4 years ago
- DDos-Blitz is a Distributed-Denial-of-Service script which sends multiple HTTP requests to the server using multi threading and fake IP. …☆11Oct 29, 2023Updated 2 years ago
- Socks5 Proxy HTTP/HTTPS-Flooding (cc) Test☆106May 24, 2025Updated 11 months ago
- Most Complete Hacking Toolkit☆223May 27, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- (DDos-attacker) Tool!☆141Aug 28, 2023Updated 2 years ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆15Sep 3, 2021Updated 4 years ago
- Worm/Trojan/Ransomware/apt/Rootkit/Virus Database☆102Oct 3, 2024Updated last year
- Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many co…☆715Dec 21, 2020Updated 5 years ago
- DOS TOOL WITH PYTHON LAYER7 :) (HTTP FLOOD)☆132Jun 2, 2024Updated last year
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Automated management of Anki cards based on Joplin notes for effective spaced repetition learning.☆13Jan 13, 2026Updated 3 months ago
- This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.☆389Apr 4, 2021Updated 5 years ago
- A tool to perform DDoS attack with control panel to control your crazy zombies : )☆186Jul 5, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Sep 1, 2015Updated 10 years ago
- ☆15Oct 21, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 6 years ago
- Golang httpflood(socket) can down a normal website in 10s with 100 connections☆341Aug 24, 2022Updated 3 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 10 years ago
- API for MPL Indonesia Season 10☆12Aug 18, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated 2 years ago
- Payload generator to exfiltrate user cookies through the PHP info page bypassing the HttpOnly flag during XSS exploitation.☆20Dec 20, 2023Updated 2 years ago
- PoC of five Slow Rate HTTP/2 DoS attacks seen in a research paper☆10Mar 31, 2018Updated 8 years ago
- 📡 Overload DoS Tool☆431May 16, 2023Updated 2 years ago
- Advanced Rust DDoS testing tool with Layer 4/7 attacks, Tor integration, evasion, and spoofing for security☆280Aug 6, 2025Updated 9 months ago
- This repository is designed to provide a comprehensive guide to Python programming, covering everything from basic concepts to advanced t…☆19May 16, 2025Updated 11 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Aug 5, 2022Updated 3 years ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- DDOS WRITTEN IN C # TCP/HTTP/HTTPS☆18Jan 15, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Apr 30, 2021Updated 5 years ago
- Skills To Improve Before Heading to OSCP☆15May 14, 2017Updated 8 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- DDoS attack. Creating infinite http GET requests.☆178May 19, 2024Updated last year
- This is An Offensive Hacking Tool which can be used by hackers and for penetration testing purposes. Hack Responsibly!!!!!!!☆125Jan 14, 2026Updated 3 months ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago