DNS amplification DDOS attack tool.
☆43Nov 10, 2021Updated 4 years ago
Alternatives and similar repositories for j0lt
Users that are interested in j0lt are comparing it to the libraries listed below
Sorting:
- Implementation for - Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches☆13Oct 9, 2019Updated 6 years ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆64Dec 27, 2020Updated 5 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- Slow Loris DDoS Attack☆26Oct 27, 2023Updated 2 years ago
- A Simple Reflection and Amplification DoS Attack Tool Based on Saddam.☆29Dec 18, 2018Updated 7 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- This repo tracks all releases and changes in them for FastNetMon Advanced☆10Oct 16, 2025Updated 4 months ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- 基于树莓派的自动驾驶小车,具有巡线、避障、音频、红外跟随、人脸识别、颜色识别、发送邮件功能 (Self-driving car based on raspberry pi)☆15Jun 29, 2022Updated 3 years ago
- Botnet is a form of malware that attacks computers on the internet and controls them with command and control servers to perform a wide v…☆11May 12, 2020Updated 5 years ago
- ☆10Jul 8, 2024Updated last year
- Yandex browser password recovery☆11Apr 9, 2025Updated 11 months ago
- Interface to Web WhatsApp Messenger and send messages to whatsapp users☆10Jun 15, 2015Updated 10 years ago
- An hCaptcha solver API based on my package.☆10Apr 5, 2021Updated 4 years ago
- Set of tools for anti DDOS attacks protection on shared/dedicated hosting☆11Jan 31, 2014Updated 12 years ago
- These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming☆15Feb 24, 2024Updated 2 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Data Driven AI-based Honeypot☆26Jan 28, 2026Updated last month
- Payloads that can be used for testing web application firewalls☆15Oct 11, 2022Updated 3 years ago
- SP Security related materials☆12Jun 14, 2022Updated 3 years ago
- ☆16Jun 15, 2025Updated 8 months ago
- Safety Layer for LLM Database Interactions☆48Dec 31, 2025Updated 2 months ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- API de integración para los servicios de iFactura para generar facturas electronicas AFIP.☆10Jul 2, 2021Updated 4 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- Simple web API in php which takes as a parameter with GET requests to launch attacks with scripts present on the machine. There is also …☆11Mar 27, 2021Updated 4 years ago
- Two-factor authentication module for simpleSAMLphp using Google Authenticator☆13Mar 31, 2022Updated 3 years ago
- A management UI for MikroTik Routers based onto Django☆13Dec 16, 2019Updated 6 years ago
- Masko Code — a living mascot companion for your terminal☆39Updated this week
- Sample demo to show case Pulumi Automation API in a nextjs project☆12Apr 21, 2022Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- Scripting together some of my favorite Python tools for doing initial triage of a suspected malicious document (e.g. PDF, DOC, DOCX, XSLM…☆17Mar 8, 2022Updated 4 years ago
- OPA policies for securing Docker API☆11Aug 14, 2023Updated 2 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- Sleep obfuscation in golang based on ekko☆13Jan 16, 2024Updated 2 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago