thesc1entist / j0ltView external linksLinks
DNS amplification DDOS attack tool.
☆43Nov 10, 2021Updated 4 years ago
Alternatives and similar repositories for j0lt
Users that are interested in j0lt are comparing it to the libraries listed below
Sorting:
- Slowloris HTTP DoS RSnake☆23Apr 2, 2016Updated 9 years ago
- Dns amplification attack☆23Mar 22, 2019Updated 6 years ago
- Slow Loris DDoS Attack☆26Oct 27, 2023Updated 2 years ago
- ☆28Jun 14, 2018Updated 7 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Microsoft Network Service Fingerprinting Tool☆67Jan 2, 2026Updated last month
- Simple API for Open BYMA Data☆16Oct 9, 2025Updated 4 months ago
- ☆10Jul 8, 2024Updated last year
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- 基于树莓派的自动驾驶小车,具有巡线、避障、音频、红外跟随、人脸识别、颜色识别、发送邮件功能 (Self-driving car based on raspberry pi)☆15Jun 29, 2022Updated 3 years ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆73Jul 29, 2025Updated 6 months ago
- Simple web API in php which takes as a parameter with GET requests to launch attacks with scripts present on the machine. There is also …☆11Mar 27, 2021Updated 4 years ago
- Python script to send SSH command to Mikrotik device☆12May 2, 2020Updated 5 years ago
- Data Driven AI-based Honeypot☆25Jan 28, 2026Updated 2 weeks ago
- Payloads that can be used for testing web application firewalls☆14Oct 11, 2022Updated 3 years ago
- A way to track and visualize current and past locations of multiple cell phones on Google Maps. Includes geofencing, prevents texting wit…☆13Dec 9, 2012Updated 13 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming☆15Feb 24, 2024Updated last year
- Parallel and scalable implementation of a NetFlow probe for multi-10 Gbit networks☆15Aug 8, 2017Updated 8 years ago
- Safety Layer for LLM Database Interactions☆47Dec 31, 2025Updated last month
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- An hCaptcha solver API based on my package.☆10Apr 5, 2021Updated 4 years ago
- Test antiviruses☆12Dec 3, 2023Updated 2 years ago
- Notes some analysis related to VidarStealer sample☆17May 5, 2024Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- Set of tools for anti DDOS attacks protection on shared/dedicated hosting☆11Jan 31, 2014Updated 12 years ago
- Interface to Web WhatsApp Messenger and send messages to whatsapp users☆10Jun 15, 2015Updated 10 years ago
- ☆16Jun 15, 2025Updated 8 months ago
- ☆23Jun 28, 2025Updated 7 months ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Powerful Python DDoS Script☆11May 17, 2022Updated 3 years ago
- OPA policies for securing Docker API☆11Aug 14, 2023Updated 2 years ago
- Tutorial for (PyTorch) + (C++) + (Metal shader)☆16Oct 25, 2025Updated 3 months ago
- my rrd statistic scripts☆17Dec 2, 2025Updated 2 months ago
- A STL-like graph library☆13Sep 5, 2025Updated 5 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago