Dns amplification attack
☆24Mar 22, 2019Updated 6 years ago
Alternatives and similar repositories for Dns-Amplification-Attack
Users that are interested in Dns-Amplification-Attack are comparing it to the libraries listed below
Sorting:
- this tool will give you freedom to crack wpa-wpa2 passwords with ease and also in a efficient way without any hassle.☆11May 25, 2019Updated 6 years ago
- ☆10Jul 8, 2024Updated last year
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago
- ☆26Mar 3, 2026Updated last week
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- ☆23Jun 28, 2025Updated 8 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Whatsapp Super Fast Filter Pro can help you quickly filter more than 100,000 numbers per hour!☆10May 22, 2024Updated last year
- DNS amplification DDOS attack tool.☆43Nov 10, 2021Updated 4 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆12Aug 30, 2022Updated 3 years ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆286Oct 1, 2025Updated 5 months ago
- Implementation for - Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches☆13Oct 9, 2019Updated 6 years ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 7 months ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- this is a tool to detect the Web service is ok or not☆23Oct 14, 2020Updated 5 years ago
- improved external backtrack☆11Apr 16, 2019Updated 6 years ago
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- ☆13Jun 14, 2024Updated last year
- ☆11Jun 3, 2023Updated 2 years ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- GCC生成Shellcode框架☆18Apr 7, 2025Updated 11 months ago
- Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.8 on x86_64, hides files, hides process, hides bind shell …☆18Feb 15, 2026Updated 3 weeks ago
- AES Encryption using x86 Assembly (NASM)☆15Jun 15, 2020Updated 5 years ago
- ☆18Sep 27, 2025Updated 5 months ago
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- Advanced Hunting Queries☆20Feb 26, 2026Updated last week
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 3 weeks ago
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x☆104Dec 16, 2025Updated 2 months ago
- Burp extension that add a tab to edit Office Open XML document (xlsx,docx,pptx)☆14Nov 26, 2017Updated 8 years ago