Original DNS-Flood tool found on code.google.com
☆13Jul 10, 2021Updated 4 years ago
Alternatives and similar repositories for dns-flood
Users that are interested in dns-flood are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- A .git/ folder disclosure exploit☆21Jul 14, 2019Updated 6 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 3 years ago
- ☆23Jun 28, 2025Updated 9 months ago
- ☆10Jul 8, 2024Updated last year
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Tools that can be useful for OSEP exam and PEN300 studies.☆88Mar 14, 2026Updated last month
- A comprehensive WiFi penetration testing framework for security professionals☆17Jul 18, 2025Updated 8 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- Implementation for - Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches☆13Oct 9, 2019Updated 6 years ago
- ☆18Sep 27, 2025Updated 6 months ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆49Jan 10, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AWS X-Ray for Covert Command & Control☆45Oct 13, 2025Updated 6 months ago
- this is a tool to detect the Web service is ok or not☆24Oct 14, 2020Updated 5 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- Advanced Hunting Queries☆20Mar 18, 2026Updated 3 weeks ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated 2 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated last year
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 7 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Jun 4, 2018Updated 7 years ago
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆19Oct 18, 2024Updated last year
- https://bc-security.gitbook.io/empire-wiki/☆13Aug 2, 2023Updated 2 years ago
- Repo to hold my PowerShell Scripts☆17Oct 19, 2022Updated 3 years ago
- Reversing Samsung SecretZone. Decrypt MSR files without any password! All thanks to Francesco Picasso. Only commercial (paid) support is …☆22Feb 13, 2026Updated 2 months ago
- ☆27Feb 3, 2026Updated 2 months ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 7 months ago