lilmond / sudos
Layer 7 DDoS tool that supports sophisticated attack methods.
☆26Updated 2 weeks ago
Alternatives and similar repositories for sudos:
Users that are interested in sudos are comparing it to the libraries listed below
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated last year
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆58Updated 3 years ago
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping☆77Updated 3 years ago
- Ro3b - Advance Banking HTTP Botnet☆49Updated last year
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆33Updated 5 years ago
- FrameDomain Framework - subdomains enumeration tool for penetration testers☆30Updated 3 years ago
- Bruteforce tool / cracker for MD5 hashes. Processing single hashes, lists and combolists (userid:md5hash).☆35Updated 3 years ago
- AAP Finder (Advanced Admin Page Finder) is a tool written in Python3 with advanced functionalities☆47Updated last year
- Multi tool checker account validator 2020☆34Updated 3 years ago
- ☆17Updated 2 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 2 years ago
- AXIS Botnet☆15Updated 8 months ago
- It is all in One Pentesting tool . It Has modules , Information Gathering exploitation + vulnerability scanning , proxy scraper and wo…☆20Updated 3 weeks ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆22Updated 4 years ago
- 🌐🔍 Red Network Tool is a tool for network exploration and info finding.☆39Updated 2 years ago
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 37 common web applicatio…☆22Updated last year
- send request flooding with cloudflare bypass☆7Updated 2 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Information Gathering Simplified.☆61Updated 2 years ago
- Reverse And Dorking Tools☆26Updated 3 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆15Updated 5 years ago
- Encryptor and File Manager | bypass webshell upload☆29Updated 3 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- bring shell grabber a python bot which grab shells easily just by entering site list and it search for vulnerabilities as well as exploit…☆41Updated 3 years ago
- Active reconaissance, information gathering and OSINT built in a portable web application test.☆41Updated 10 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- Script to facilitate different functions and checks☆45Updated 2 years ago
- A Linux worm targeting vulnerable IoT devices with MMU. Reengineered from/inspired by Mirai botnet.☆16Updated 2 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆55Updated 2 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆51Updated last year