Mr.sipSIP-Based Audit and Attack Tool
Stars: ✭ 266 (+94.16%)
CamerattackAn attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Stars: ✭ 192 (+40.15%)
CCATK高度自动化CC脚本
Stars: ✭ 107 (-21.9%)
PummelSocks5 Proxy HTTP/HTTPS-Flooding (cc) attack
Stars: ✭ 53 (-61.31%)
ddosDDoS Attack & Protection Tools for Windows, Linux & Android
Stars: ✭ 84 (-38.69%)
Cc AttackUsing Socks4/5 proxy to make a multithreading Http-flood/Https-flood (cc) attack.
Stars: ✭ 145 (+5.84%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+3.65%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-59.85%)
Python-BotnetThis is a simple DDoS python botnet script with remote monitoring & management for education purposes.
Stars: ✭ 119 (-13.14%)
Impulse💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+292.7%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (-18.25%)
Hoomanhttp interceptor to hoomanize cloudflare requests
Stars: ✭ 82 (-40.15%)
Vaim SmsTHIS TOOL IS FOR DDOS ATTACK ON PHONE NUMBER YOU CAN USE THIS TOOL ON YOUR KALI LINUX OR TERMUX ALSO IF IS NOT WORK THEN PLEASE CONTACT ME IN "VAIMPIER RITIK" YOUTUBE CHANNEL THANKYOU FOR COMING HERE ......
Stars: ✭ 62 (-54.74%)
ProxyA simple tool for fetching usable proxies from several websites.
Stars: ✭ 124 (-9.49%)
Ddos RootsecDDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (-21.17%)
CtfsubmitterA flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-59.12%)
SkaSimple Karma Attack
Stars: ✭ 55 (-59.85%)
EdgeA set of useful libraries for Edge Apps. Run locally, write tests, and integrate it into your deployment process. Move fast and maybe don't break things? Because, gosh darnit, you're an adult.
Stars: ✭ 105 (-23.36%)
Eddsa Fault AttackFault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
Stars: ✭ 53 (-61.31%)
Timeless Timing AttacksA Python implementation that facilitates finding timeless timing attack vulnerabilities.
Stars: ✭ 45 (-67.15%)
Dark Fantasy Hack ToolDDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web application hacking information. Email scraper: To get all emails related to a webpage IMDB Rating: Easy way to access the movie database. Both .exe(compressed as zip) and .py versions are available in files.
Stars: ✭ 131 (-4.38%)
IppsampleIPP sample implementations.
Stars: ✭ 123 (-10.22%)
AltairLightweight and Robust API Gateway written in Go
Stars: ✭ 34 (-75.18%)
AptAPT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 83 (-39.42%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-16.79%)
Free adv trainOfficial TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Stars: ✭ 127 (-7.3%)
Esp8266 deautherAffordable WiFi hacking platform for testing and learning
Stars: ✭ 9,312 (+6697.08%)
Ngx dynamic limit req moduleThe ngx_dynamic_limit_req_module module is used to dynamically lock IP and release it periodically.
Stars: ✭ 57 (-58.39%)
LambdaattackMinecraft bot for servers. Currently supports stress testing. More features are planned
Stars: ✭ 133 (-2.92%)
UdpxA Fast UDP Proxy written in Golang
Stars: ✭ 56 (-59.12%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+7442.34%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-85.4%)
Node Rate Limiter FlexibleNode.js rate limit requests by key with atomic increments in single process or distributed environment.
Stars: ✭ 1,950 (+1323.36%)
X ProxiesUsable ip proxies, crawling from some proxy websites.
Stars: ✭ 53 (-61.31%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-23.36%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-70.8%)
Ddos ScriptsThis repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.
Stars: ✭ 135 (-1.46%)
UfonetUFONet - Denial of Service Toolkit
Stars: ✭ 963 (+602.92%)
Nonce DisrespectNonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (-24.82%)
Pspider简单易用的Python爬虫框架,QQ交流群:597510560
Stars: ✭ 1,611 (+1075.91%)
Wi PwnESP8266 Deauther with a material design WebUI 📶
Stars: ✭ 839 (+512.41%)
Rat Hodin V2.9Remote Administration Tool for Linux
Stars: ✭ 97 (-29.2%)
Proxy ScraperProxy-Scraper is simple Perl script for scraping proxies from multiple websites.
Stars: ✭ 24 (-82.48%)
Physics CommandPhysics platform is a tool for hardware systems (e.g: raspberryPi 3B ). It retrieves data passing through the network and sends it to a control panel. It works the same way as a botnet by receiving remote commands. (you can imagine that as a black box)
Stars: ✭ 23 (-83.21%)
CtiCyber Threat Intelligence Repository expressed in STIX 2.0
Stars: ✭ 822 (+500%)
BaiducrawlerSample of using proxies to crawl baidu search results.
Stars: ✭ 116 (-15.33%)
DeautherdroidAdditional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (-32.12%)
IstioConnect, secure, control, and observe services.
Stars: ✭ 28,970 (+21045.99%)
EmagnetAutomated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (+402.19%)
Wifi Spam✉️📡 Spam thousands of WiFi access points with custom SSIDs
Stars: ✭ 92 (-32.85%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (+402.19%)
EvilurlGenerate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (+377.37%)