c0r0n3r / dheaterLinks
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
☆209Updated last year
Alternatives and similar repositories for dheater
Users that are interested in dheater are comparing it to the libraries listed below
Sorting:
- Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)☆71Updated 2 years ago
- Proof of concept for DoS exploit☆54Updated 2 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆66Updated 6 years ago
- Complete SMS packet manipulation☆114Updated 4 years ago
- ☆85Updated 2 years ago
- Multithread reverse shell listener☆26Updated last year
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆111Updated 2 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆159Updated this week
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆138Updated last year
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆140Updated last year
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- Low Interaction Mobile Honeypot☆96Updated 5 months ago
- Pwning IPv6 Networks☆37Updated last month
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Updated 2 years ago
- Check IP addresses against known cloud provider IP address ranges☆46Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆73Updated last year
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆19Updated 3 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 9 months ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆52Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆50Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆130Updated last week
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆79Updated 2 years ago
- brute force SSH public-key authentication☆79Updated 5 months ago