tony2037 / Dns-Amplification-Attack
Dns amplification attack
☆19Updated 6 years ago
Alternatives and similar repositories for Dns-Amplification-Attack
Users that are interested in Dns-Amplification-Attack are comparing it to the libraries listed below
Sorting:
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆67Updated 5 years ago
- Proof of concept for DoS exploit☆54Updated last year
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆56Updated 4 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆71Updated last year
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆54Updated 3 years ago
- Postfix SMTP Smuggling - Expect Script POC☆25Updated last year
- PoC for CVE-2023-20126☆22Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- MacroExploit use in excel sheet☆20Updated last year
- A basic proxylogon scanner☆27Updated 3 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 4 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- ☆19Updated 3 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Updated 9 years ago
- A DMARC scanning and parsing tool.☆33Updated last month
- A collaborative, multi-platform, red teaming framework☆14Updated 5 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆45Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- nmap nse script for scan a whole country☆14Updated 2 years ago
- delosNmap | Nmap Script☆40Updated 2 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆40Updated 4 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 4 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆63Updated 2 years ago