RUDY DOS attack script
☆12Nov 9, 2025Updated 4 months ago
Alternatives and similar repositories for rudydos
Users that are interested in rudydos are comparing it to the libraries listed below
Sorting:
- A fully automated setup of Shibboleth Idp and SP with many options and features☆12Mar 31, 2022Updated 3 years ago
- Verify and decrypt .NET's .ASPXAUTH cookie from node.☆12Jul 18, 2023Updated 2 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Flexible OpenVPN authentication server and vpn client configuration tools☆13Mar 6, 2012Updated 14 years ago
- A module to add some extra things to the Cyberpunk Red - Core system for Foundry VTT☆11Dec 1, 2025Updated 3 months ago
- Windows Installation Diff Tool☆10Jun 24, 2016Updated 9 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Detecting attack tool for HTTP server such as Apache and Nginx.☆10Dec 22, 2013Updated 12 years ago
- ☆10Aug 19, 2021Updated 4 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- An alarm callback plugin for executing a script on Graylog2's server.☆11Apr 23, 2016Updated 9 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- Docker container for OpenVAS8☆12Nov 2, 2015Updated 10 years ago
- A curated set of practical DevOps resources including infrastructure as code, automation scripts, configuration management playbooks, and…☆14Feb 18, 2026Updated 2 weeks ago
- Priss is a CSS print framework that ensures that your web pages are nice and readable when printed.☆32Mar 31, 2010Updated 15 years ago
- Fail2Ban Filters to help Protect your Apache Web Servers from Scanners such as nmap , sqlmap , nikto , vega, and other Vulnerability Scan…☆15Jul 11, 2018Updated 7 years ago
- ☆21Aug 7, 2014Updated 11 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆27Mar 31, 2025Updated 11 months ago
- Tools for Wazuh by Juan C. Tello☆15Jan 13, 2022Updated 4 years ago
- ☆13Feb 23, 2020Updated 6 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- ☆19Dec 13, 2013Updated 12 years ago
- This is simple javascript excel viewer to view csv, xls and xlsx file in browser.☆17Jan 17, 2023Updated 3 years ago
- ☆14Jun 20, 2025Updated 8 months ago
- Gophish with Malicious Attachment and HTTP redirect support☆13Dec 11, 2023Updated 2 years ago
- MD4 Collisions MD4 is a 128-bit cryptographic hash function, meaning it should take a work factor of roughly 2^64 to find collisions. It…☆17Dec 19, 2017Updated 8 years ago
- This Repo is a storage of Postman collections for Magento☆15May 3, 2019Updated 6 years ago
- The DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event…☆12Apr 18, 2019Updated 6 years ago
- example of how to use and write a custom ansible callback plugin for sending task and playbook output on run to an external endpoint - WI…☆14Feb 15, 2023Updated 3 years ago
- Fork of Mark Ruys' check_glusterfs from http://exchange.nagios.org/directory/Plugins/System-Metrics/File-System/GlusterFS-checks/details☆13May 15, 2019Updated 6 years ago
- ☆17May 22, 2021Updated 4 years ago
- ☆21Aug 31, 2025Updated 6 months ago
- ☆15Jan 21, 2020Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- My own terraform sample☆17Aug 6, 2024Updated last year
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Python client for Consul Service Discovery API☆15Sep 3, 2019Updated 6 years ago