c0r0n3r / dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆198Updated last year
Alternatives and similar repositories for dheater
Users that are interested in dheater are comparing it to the libraries listed below
Sorting:
- Proof of concept for DoS exploit☆54Updated last year
- Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)☆67Updated last year
- HTTP stress testing tool that can overload web servers.☆91Updated last month
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- A pre-DDoS security assessment tool☆120Updated 3 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆45Updated 5 years ago
- Find exploits in local and online database☆74Updated 7 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆107Updated 2 years ago
- Multithread reverse shell listener☆25Updated last year
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Updated 3 years ago
- Notus is a vulnerability scanner for creating results from local security checks☆50Updated this week
- RUDY is an acronym used to describe a Denial of Service (DoS) tool used by hackers to perform slow-rate a.k.a. “Low and slow” attacks.☆70Updated last year
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 7 years ago
- This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".☆68Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆43Updated 8 months ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆88Updated last year
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆129Updated 11 months ago
- Layer 7 DDoS tool that supports sophisticated attack methods.☆25Updated 2 weeks ago
- LulzDDOS TOOL- powerful DDoS toolkit for penetration tests☆29Updated last year
- Deauthalyzer is a script designed to monitor WiFi networks and detect deauthentication attacks. It utilizes packet sniffing and analysis …☆55Updated last year
- NetWatch: A real-time network monitoring tool that tracks established connections and sends email alerts if the threshold is exceeded, en…☆7Updated 2 years ago
- censors pose a threat to the entire Internet☆133Updated 3 years ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆56Updated 4 years ago
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆117Updated last year
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆69Updated last year
- "Overload" is a python program that sends active connections to any target of some sort. It is used to perform a DoS/DDoS attack.☆105Updated 5 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆68Updated 2 years ago
- Find Real IPs hidden behind Cloudflare with Criminal IP(criminalip.io), security OSINT Tool.☆104Updated last year
- A tool to test SIM card security☆118Updated 2 years ago