RUDY DOS attack script
☆12Nov 9, 2025Updated 4 months ago
Alternatives and similar repositories for rudydos
Users that are interested in rudydos are comparing it to the libraries listed below
Sorting:
- R-U-Dead-Yet, or RUDY for short, implements the generic HTTP DoS attack via long form field submissions.☆23Dec 10, 2016Updated 9 years ago
- To host ProcessMaker v3 Community Editions☆10Jun 18, 2024Updated last year
- A fully automated setup of Shibboleth Idp and SP with many options and features☆12Mar 31, 2022Updated 3 years ago
- ☆12Feb 16, 2012Updated 14 years ago
- Host your own IPTV channels☆14Jul 25, 2023Updated 2 years ago
- Script to extract a signature of the first blocks of the disk, to be able to dectect boot tampering attemps.☆10Jul 8, 2016Updated 9 years ago
- Dump Elasticsearch or Opensearch indexes to blob storage, fast☆17Feb 3, 2025Updated last year
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Maxscale Exporter for Prometheus☆12Feb 15, 2023Updated 3 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Woleet.ID Server Edition: Identity, Key and Signature server for organizations.☆10Feb 24, 2023Updated 3 years ago
- Flexible OpenVPN authentication server and vpn client configuration tools☆13Mar 6, 2012Updated 14 years ago
- Verify and decrypt .NET's .ASPXAUTH cookie from node.☆12Jul 18, 2023Updated 2 years ago
- PHP Vulnerability Hunter (fork)☆12May 8, 2015Updated 10 years ago
- Detecting attack tool for HTTP server such as Apache and Nginx.☆10Dec 22, 2013Updated 12 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- ☆10Aug 19, 2021Updated 4 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- A simple Jinka wrapper written in Python.☆10Oct 9, 2021Updated 4 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Docker container for OpenVAS8☆12Nov 2, 2015Updated 10 years ago
- Priss is a CSS print framework that ensures that your web pages are nice and readable when printed.☆32Mar 31, 2010Updated 15 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- ☆14Jun 20, 2025Updated 8 months ago
- ☆13Feb 23, 2020Updated 6 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- This is simple javascript excel viewer to view csv, xls and xlsx file in browser.☆17Jan 17, 2023Updated 3 years ago
- LogStash Grok patterns☆14Aug 3, 2016Updated 9 years ago
- ☆19Dec 13, 2013Updated 12 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- MD4 Collisions MD4 is a 128-bit cryptographic hash function, meaning it should take a work factor of roughly 2^64 to find collisions. It…☆17Dec 19, 2017Updated 8 years ago
- ☆21Aug 31, 2025Updated 6 months ago
- The DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event…☆12Apr 18, 2019Updated 6 years ago
- Cerberus is a toolkit to receive, parse, process and automate abuse reports handling received by ISP or hosting providers.☆15Jun 11, 2019Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Pure-Python wrappings over nvapi☆16Aug 31, 2021Updated 4 years ago
- A notification plugin for Nagios to figure out if responsive or none-responsive HTML emails are to be sent to the contact person's email …☆17Sep 25, 2017Updated 8 years ago