A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbers to a particular IP and port.
☆164Nov 26, 2025Updated 4 months ago
Alternatives and similar repositories for turbo-attack
Users that are interested in turbo-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A port scanner and service detection tool that uses 1000 goroutines at once to scan any hosts IP or FQDN with the sole purpose of testing…☆166Nov 26, 2025Updated 4 months ago
- An open-source Python Selenium Test Automation framework with Docker and Kubernetes integration.☆32Nov 26, 2025Updated 4 months ago
- DC540 hacking challenge 0x00004 [C CTF].☆11Nov 26, 2025Updated 4 months ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Nov 26, 2025Updated 4 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Deepfake Detector is an AI/ML model designed to detect AI-generated or manipulated images.☆33Nov 26, 2025Updated 4 months ago
- A series of small ARM 64 bite-size articles to help one better reverse AArch64 ARM 64 Linux binaries.☆21Nov 27, 2025Updated 4 months ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- ☆10Apr 2, 2022Updated 3 years ago
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 4 months ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- A FREE comprehensive step-by-step 8-bit ATmega328P C and Assembler tutorial covering Embedded Software Development to Reverse Engineering…☆11Nov 26, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Nov 26, 2025Updated 4 months ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Inspired by Andrej Karpathy’s "Let’s Build GPT", this project guides you step‑by‑step to build a GPT from scratch, demystifying its archi…☆27Dec 12, 2025Updated 3 months ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for autho…☆27Nov 26, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆14Dec 3, 2020Updated 5 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆13Jul 30, 2021Updated 4 years ago
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- A powerful reverse shell generator☆46Mar 18, 2026Updated last week
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated 2 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Mar 24, 2023Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- Meterpreter payload for all platforms☆74Jan 2, 2022Updated 4 years ago
- ☆10Mar 29, 2022Updated 4 years ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated last year