Cerberus is another simple stressing tool simulating DDoS attacks.
☆21Mar 13, 2025Updated 11 months ago
Alternatives and similar repositories for cerberus
Users that are interested in cerberus are comparing it to the libraries listed below
Sorting:
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- A fork of thc-ssl-dos that supports all SSL/TLS implementations, UDP (using DTLS), SOCKS5 proxy and both renegotiation and reconnect atta…☆15Aug 1, 2022Updated 3 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated last year
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Nov 15, 2022Updated 3 years ago
- Open-Source Phishing Toolkit☆20May 23, 2021Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Oct 9, 2020Updated 5 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆28Feb 8, 2023Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29May 18, 2018Updated 7 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 3 weeks ago
- Code snippets from my blog☆29Oct 13, 2025Updated 4 months ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Oct 22, 2020Updated 5 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- ☆65Mar 15, 2024Updated last year
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Ingest openldap data into bloodhound☆79Apr 1, 2021Updated 4 years ago
- Private and self-hosted file sharing over the Tor network written in golang☆118Jun 18, 2025Updated 8 months ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 3 years ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 3 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Specifications for the Swedish OpenID Connect profile☆13Feb 5, 2026Updated last month
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- g(ULP) core backend and plugins☆56Updated this week
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆85Jan 12, 2026Updated last month
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago