vaprub / Aura-DDoSView external linksLinks
Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )
☆24May 10, 2023Updated 2 years ago
Alternatives and similar repositories for Aura-DDoS
Users that are interested in Aura-DDoS are comparing it to the libraries listed below
Sorting:
- HTTP-BROWSER layer 7 attack method bypassing Cloudflare JS Challenges and HTTP-DDOS ruleset.☆11Jan 30, 2024Updated 2 years ago
- I am a simple shell script that downloads all repositories from a user and then hunts them for sh1t.☆11Jul 21, 2022Updated 3 years ago
- Scanning Result of MetaScan's AI GPTScan Engine for 13 DefiHacks Projects under 10 Logic Vuln Types☆13Aug 8, 2023Updated 2 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- ☆25Feb 9, 2026Updated last week
- A powerful stress testing tool designed to assess the robustness and performance of your web applications through Layer 7 stress testing.…☆14Aug 31, 2024Updated last year
- Android Remote Administration Tool☆41Apr 22, 2021Updated 4 years ago
- bypass https-get - cloudflare nosec - cloudflare uam☆13Jul 12, 2022Updated 3 years ago
- Powerfull DDOS Panel with advanced bypass methods.☆38Mar 29, 2021Updated 4 years ago
- The system consists of multiple AI agents that collaborate to strategize, generate commands, and execute scans based on the client's desc…☆56Apr 6, 2024Updated last year
- Extract ID from any facebook profile, only with profile link.☆28Oct 30, 2022Updated 3 years ago
- A working cloudflare uam bypass !!☆38Apr 28, 2025Updated 9 months ago
- HLDS Builds (Linux Only)☆20Feb 28, 2021Updated 4 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆27Nov 11, 2020Updated 5 years ago
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Apr 17, 2022Updated 3 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- 5xDDoS is a DDoS tool with great attack power, be careful when using it☆52Oct 5, 2025Updated 4 months ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- FortiOS 管理界面中的堆内存下溢导致远程代码执行☆23Jun 21, 2023Updated 2 years ago
- DDOS☆23Mar 29, 2021Updated 4 years ago
- HASOKI DDOS TOOL- powerful DDoS toolkit for penetration tests☆122Dec 16, 2023Updated 2 years ago
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- a powerful script for find login [admin] pages !☆69Oct 13, 2024Updated last year
- VulnMapAI combines the power of nmap’s detailed network scanning and the advanced natural language processing capabilities of GPT-4 to ge…☆32Oct 18, 2023Updated 2 years ago
- DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc..…☆857Jul 25, 2023Updated 2 years ago
- DDos-Attack Is A Python script online Attack☆28Apr 28, 2020Updated 5 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆36Jul 8, 2020Updated 5 years ago
- Exploits | MIRAI AND SCANNERS | Layer4 Methods | Layer7 Methods | UDP METHODS | TCP METHODS | BRUTERS | VULN | LISTS☆67Aug 2, 2024Updated last year
- Herramienta de recopilación de información por numero de DNI de PERU . Herramienta garantizado.☆13Nov 18, 2024Updated last year
- PHP SDK for Telegram bots API☆14Aug 31, 2025Updated 5 months ago
- This script will able to you to bypass captcha, uam, and bfm challenge of cloudflare☆29Dec 29, 2025Updated last month
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆34May 24, 2025Updated 8 months ago
- A tool to make any website or web server busy by sending requests of your own preference! If you have any question iam mostly active on I…☆34Feb 4, 2025Updated last year
- Telegram phishing is for testing purposes only and the security of users is responsible for any misuse☆10Feb 20, 2021Updated 4 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- AI-driven CVE search - deepest analysis of Common Vulnerabilities and Exposures (CVE)☆13Feb 22, 2024Updated last year
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago