francesco-ficarola / cerberus
Cerberus is another simple stressing tool simulating DDoS attacks.
☆22Updated last year
Related projects: ⓘ
- Shell hunter for AF☆34Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 2 years ago
- ☆15Updated 2 months ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆12Updated 2 years ago
- ☆17Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- ☆20Updated this week
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 6 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆3Updated last year
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- ☆22Updated this week
- A rogue DNS detector☆23Updated 11 months ago
- Sp00fer blog post -☆25Updated 2 years ago
- ☆29Updated this week
- Simple Live Data Collection Tool☆21Updated 3 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆21Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Simple utility to manage multiple ssh☆13Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- ☆22Updated 3 years ago
- Ideaslocas Repository☆37Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆35Updated 4 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆26Updated 3 years ago