francesco-ficarola / cerberus
Cerberus is another simple stressing tool simulating DDoS attacks.
☆21Updated 2 years ago
Alternatives and similar repositories for cerberus:
Users that are interested in cerberus are comparing it to the libraries listed below
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Open YARA scan- and search engine☆20Updated last month
- ☆22Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- ☆17Updated 3 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- ☆16Updated 6 months ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 5 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- A rogue DNS detector☆23Updated last year
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- ☆42Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- File integrity monitor proof-of-concept in PowerShell sends a message via Telegram when it detects changes to a specified directory. It c…☆11Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- ☆15Updated 3 years ago
- DNS logging, detection, ...☆15Updated 2 years ago
- External telegram feeder for AIL framework☆14Updated this week
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- ☆10Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆21Updated last year
- ☆22Updated 2 years ago
- ☆17Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago