cispa / loop-DoS
Repository for application-layer loop DoS
☆33Updated last year
Alternatives and similar repositories for loop-DoS
Users that are interested in loop-DoS are comparing it to the libraries listed below
Sorting:
- A distributed network mapper/security scanner.☆16Updated last year
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆17Updated last year
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆47Updated last year
- CVE-2023-20198 Checkscript☆18Updated last year
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- ☆18Updated 7 months ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆38Updated last week
- ☆55Updated 7 months ago
- Unicode Security Toolkit☆35Updated 7 months ago
- KeyTrap (DNSSEC)☆41Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- ☆63Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆62Updated 5 months ago
- ☆31Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Automated vulnerability discovery and annotation☆67Updated 9 months ago
- Upload files done during my research.☆159Updated last month
- PoC for CVE-2024-27130☆34Updated last year
- ☆32Updated 2 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆65Updated 3 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Postfix SMTP Smuggling - Expect Script POC☆25Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- One line command and control backdoors for APIs and web applications.☆50Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 3 months ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago