Original DNS-Flood tool found on code.google.com
☆14Jul 10, 2021Updated 4 years ago
Alternatives and similar repositories for dns-flood
Users that are interested in dns-flood are comparing it to the libraries listed below
Sorting:
- ☆10Jul 8, 2024Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ☆23Jun 28, 2025Updated 8 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated last month
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Implementation for - Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches☆13Oct 9, 2019Updated 6 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 7 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- this is a tool to detect the Web service is ok or not☆23Oct 14, 2020Updated 5 years ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Advanced Hunting Queries☆20Feb 26, 2026Updated last week
- ☆18Sep 27, 2025Updated 5 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 2 weeks ago
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆39Updated this week
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆19Oct 18, 2024Updated last year
- AWS X-Ray for Covert Command & Control☆45Oct 13, 2025Updated 4 months ago
- https://bc-security.gitbook.io/empire-wiki/☆13Aug 2, 2023Updated 2 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 5 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Using QRadar API☆20Feb 23, 2018Updated 8 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated last month
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated 11 months ago
- It's A Batch Code To Cracke RAR Encrypted Floders And Files☆14May 19, 2017Updated 8 years ago
- Microfocus ArcSight FlexConnector for Microsoft Sysmon tool☆19Jan 14, 2021Updated 5 years ago
- Repo to hold my PowerShell Scripts☆17Oct 19, 2022Updated 3 years ago
- Security Operation Center Lab☆20Oct 8, 2024Updated last year
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- ☆31Jul 13, 2025Updated 7 months ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Jun 4, 2018Updated 7 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 5 months ago
- ☆23Feb 5, 2026Updated last month