tony2037 / Dns-Amplification-AttackView external linksLinks
Dns amplification attack
☆23Mar 22, 2019Updated 6 years ago
Alternatives and similar repositories for Dns-Amplification-Attack
Users that are interested in Dns-Amplification-Attack are comparing it to the libraries listed below
Sorting:
- this tool will give you freedom to crack wpa-wpa2 passwords with ease and also in a efficient way without any hassle.☆11May 25, 2019Updated 6 years ago
- ☆10Jul 8, 2024Updated last year
- PoC for popping a system shell against the LnvMSRIO.sys driver☆118Oct 6, 2025Updated 4 months ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago
- zentao Getshell☆10Oct 27, 2020Updated 5 years ago
- ☆23Jun 28, 2025Updated 7 months ago
- ASP.Net Core version of the Switch Lan Play Relay server, originally written by SpaceMeowX2 in NodeJs/Typescript which can be found here:…☆10Mar 26, 2020Updated 5 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated last month
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- DNS amplification DDOS attack tool.☆43Nov 10, 2021Updated 4 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息☆14May 6, 2023Updated 2 years ago
- A comprehensive WiFi penetration testing framework for security professionals☆16Jul 18, 2025Updated 6 months ago
- Xây dựng chương trình dự đoán ngôn ngữ lập trình của source code bất kỳ☆13Mar 31, 2021Updated 4 years ago
- Implementation for - Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches☆13Oct 9, 2019Updated 6 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- linux openssh openssl for centos rhel suse☆10Oct 16, 2020Updated 5 years ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- ☆13Jun 14, 2024Updated last year
- hook detector using emulation and comparing static with dynamic outputs☆17Aug 11, 2023Updated 2 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 4 years ago
- this is a tool to detect the Web service is ok or not☆23Oct 14, 2020Updated 5 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- ☆11Jun 3, 2023Updated 2 years ago
- Original DNS-Flood tool found on code.google.com☆14Jul 10, 2021Updated 4 years ago
- Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit s…☆18Jul 2, 2025Updated 7 months ago
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.2 on x86_64, hides files, hides process, hides bind shell …☆17Feb 4, 2026Updated last week
- Advanced Hunting Queries☆20Dec 11, 2025Updated 2 months ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- FlareKiller Is Python Script Allows you To get The Real Ip Of A CloudFlare Protected Website.☆10Dec 18, 2020Updated 5 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- ☆18Sep 27, 2025Updated 4 months ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Jul 16, 2024Updated last year
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆38Updated this week