eolszewski / DDoS
This is a basic Python script that accepts a website's url in string format to initiate a DDoS attack. For educational purposes only.
☆14Updated 10 years ago
Alternatives and similar repositories for DDoS:
Users that are interested in DDoS are comparing it to the libraries listed below
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Updated 10 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆30Updated 9 years ago
- XMLRPC server for password cracking☆33Updated 9 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆14Updated 8 years ago
- A HTTP bot in Java with basic commands and ability's☆10Updated 9 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- Scripts used for phishing campaigns☆14Updated 10 years ago
- PoC Android smart phone botnet☆77Updated 12 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 7 years ago
- Programs for DoS and DDoS attacks.☆27Updated 6 years ago
- Service desk password tools.☆15Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆80Updated 11 years ago
- ARP spoof then session jack within your browser☆27Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Joomla 3.2 to 3.4.4 Remote SQL Injection Mass Exploit☆28Updated 3 years ago
- A open source proxy checker☆30Updated 9 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- SQLi Tool/SQL Injection/Hijacker☆42Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- A software having all stuff related to proxy☆8Updated last year
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Generate random wordlist to test your passwords' security☆13Updated 2 years ago