Repository for application-layer loop DoS
☆33Mar 20, 2024Updated 2 years ago
Alternatives and similar repositories for loop-DoS
Users that are interested in loop-DoS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the CCS 2022 paper "Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels".☆16Oct 17, 2022Updated 3 years ago
- KeyTrap (DNSSEC)☆44Feb 18, 2024Updated 2 years ago
- Explore the http3 by quic with examples☆15Jul 28, 2022Updated 3 years ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A differential fuzzing framework for the QUIC protocol☆19Nov 21, 2023Updated 2 years ago
- QUICforge is an experimental python tool for request forgery attacks with QUIC☆24May 1, 2022Updated 4 years ago
- 通过 ebpf(bcc) 在 TCP 包中插入 TOA,实现任意 TOA 伪造☆28Dec 12, 2023Updated 2 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 2 months ago
- ☆28Jun 7, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆21May 31, 2024Updated last year
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- A live preview for TikZ drawings☆25Mar 26, 2023Updated 3 years ago
- Workflow for AI Agent☆15Jun 12, 2025Updated 10 months ago
- Performance Counter Measurements at the cycle granularity☆19Jul 9, 2021Updated 4 years ago
- A fast and powerful CLI tool for finding secrets and other data in files, web pages, and other text sources. Supports multi-threading and…☆22Apr 2, 2026Updated last month
- 域名接管漏洞,批量检测工具☆11Oct 29, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated 2 months ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆18Sep 15, 2025Updated 7 months ago
- Services, Checkers and Exploits from saarCTF 2022. https://ctf.saarland☆14May 24, 2022Updated 3 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- ☆13Oct 24, 2024Updated last year
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- Medusa Repository: Transynther tool and Medusa Attack☆24Jul 17, 2020Updated 5 years ago
- Cookiecutter recipe to easily create ansible roles.☆12Jan 18, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- An http2 stack living on top of scapy☆11Oct 24, 2018Updated 7 years ago
- 一个教你如何Review的学习平台☆17Oct 20, 2022Updated 3 years ago
- Capture Drift Funding Rates On-Chain -- if the funding rate is negative (longs get paid) then the vault opens a new long and captures the…☆10Apr 15, 2022Updated 4 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆14Aug 27, 2024Updated last year
- PoC of five Slow Rate HTTP/2 DoS attacks seen in a research paper☆10Mar 31, 2018Updated 8 years ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 8 months ago