francesco-ficarola / cerberus
Cerberus is another simple stressing tool simulating DDoS attacks.
☆21Updated 3 weeks ago
Alternatives and similar repositories for cerberus:
Users that are interested in cerberus are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- ☆22Updated 4 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 9 months ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- SecurityBsides Roma Conference Repo☆10Updated 2 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Free Email Providers☆10Updated last year
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- A rogue DNS detector☆23Updated last year
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- ☆16Updated 8 months ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 5 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- wordlists for password cracking☆27Updated 2 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated this week
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Post-exploitation tool☆26Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago