c0r0n3r / dheaterLinks
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆202Updated last year
Alternatives and similar repositories for dheater
Users that are interested in dheater are comparing it to the libraries listed below
Sorting:
- Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)☆67Updated last year
- Proof of concept for DoS exploit☆55Updated last year
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆155Updated 5 months ago
- Complete SMS packet manipulation☆113Updated 3 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆44Updated 5 years ago
- ☆82Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆239Updated 11 months ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- on-the-fly☆85Updated last year
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated last year
- Automated rogue access point setup tool.☆197Updated 4 years ago
- Low Interaction Mobile Honeypot☆94Updated last month
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆46Updated 11 months ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Golang network scanner with arp discovery and own parser☆85Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆149Updated 3 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆75Updated 2 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Multithread reverse shell listener☆26Updated last year
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆111Updated 9 months ago
- brute force SSH public-key authentication☆77Updated 2 months ago
- Layer 7 DDoS tool that supports sophisticated attack methods.☆26Updated last month
- Sifter - All purpose penetration testing op-center☆77Updated 2 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago