Showing 14 open source projects for "byte dos attacker"

View related business solutions
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • 1
    jsoniter-scala

    jsoniter-scala

    Scala macros for compile-time generation of safe and ultra-fast JSON

    Scala macros for compile-time generation of safe and ultra-fast JSON codecs. This library had started from macros that reused jsoniter (json-iterator) for Java reader and writer but then the library evolved to have its own core of mechanics for parsing and serialization. The idea to generate codecs by Scala macros and main details was borrowed from Kryo Macros and adapted for the needs of the JSON domain. Validate parsed values safely with the fail-fast approach and clear reporting, provide...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    HighwayHash

    HighwayHash

    Fast strong hash functions: SipHash/HighwayHash

    ...It exposes simple one-shot and streaming APIs, so you can hash short keys or long byte streams with the same function. Typical uses include protecting hash tables that store untrusted keys and authenticating short-lived messages or records in storage systems. Although not a replacement for collision-resistant digests like SHA-2/3, it strikes a pragmatic balance of speed, simplicity, and resistance to common abuse patterns seen in production backends.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Ring

    Ring

    Simple and flexible programming language for applications development

    The Ring is a practical general-purpose multi-paradigm language. The supported programming paradigms are imperative, procedural, object-oriented, declarative using nested structures, functional, meta programming and natural programming. The language is portable (MS-DOS, Windows, Linux, macOS, Android, WebAssembly, Microcontrollers, etc.) and can be used to create Console, GUI, Web, Games and Mobile applications. The language is designed to be simple, small and flexible. Ring is...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    StartFlagExploit

    StartFlagExploit

    POC of Android temporary DoS (Android 10 / 11 beta 3)

    The ActivityManagerService (https://androidreverse.wordpress.com/2018/03/11/aosp-activitymanager-and-activitymanagerservice/) is a component of Android that manages the Running Applications, non-system Services, ContentProviders and much more. The StartFlag DoS Exploit sends a manipulated startActivity event telling to start another Application in "native debugging" mode (in our Test we use the PermissionGrant Activtiy wich is marked as not debuggable". A bug in the ActivityManagerService doesn't answer with forwarding a SecurityException to the Attacker, instead it throws the SecurityException without catching it. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • 5
    CLASS_DOS_ATTACKER

    CLASS_DOS_ATTACKER

    it is written in Python and perform denial of service Attacks on LAN.

    CLASS_DOS_ATTACKER is a tool written in PYTHON (in a Linux environment) to perform 5 Denial of Service Attack on a LAN: - ICMP FLOOD - TCP SYNFLOOD - ARP Cache Poisonning - DHCP Starvation - WIFI DEAUTHENTIFICATION
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    EbraSha Dos Attacker Ver 4.0

    EbraSha Dos Attacker Ver 4.0

    Custom DOS Attack In Kali Linux

    EbraSha Dos Attacker Ver 4.0 ----------- DESCRIPTION : EbraSha DOS Attacker is a network tool For custom DOS Attack EbraSha DOS Attacker Programming By Ebrahim Shafiei wiTh c++ ##### EbraSha DOS Attacker Site : Www.EbraSha.Org ----------- Features : + Syn Attack + UDP Attack + ICMP Attack + Pars Fuxy Attack Use The : (Syn,RST,PUSH,FIN,ACK,URG,XMAS,YMAS Tcp Flag) + EbraSha Crazy Attack (Send DDOS Fake Attacker To All Computer In Your Network) + EbraSha Black Sails Attack (The Best Option For Dos To Apache , Nginx , IIS , Tomcat , DataBases , RDP , ... ) + Syn Attack + Router CUP Death Attack (Kill The Cpu In A Min ;) ) + Reflected Flood Attack ----------- Copyright : EbraSha Dos Attacker Ver 4.0 Copyright (C) <2015-2017> <Ebrahim Shafiei> This program is free software: But you can not redistribute it and/or modify it under the terms of the Abdal General Private License as published by the Hacking Software Foundation , either version 1
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    EbraSha Dos Attacker

    EbraSha Dos Attacker

    Create Simple Dos Attack On A Networks

    EbraSha Dos Attacker Create By Ebrahim Shafiei For Create Simple Dos Attack On A Networks
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8

    Falcon Attacker

    Interesting multithreaded, customizable, simple denial of service tool

    Falcon Atttacker DoS Tool. Features: Choosable DNS/IP, PORT, Page, Server Timeout, Threads, Time Between Headers. POST attacks, GET attacks, TCP flood, ICMP flood, modem hangup ping exploit flood, DNS-to-IP option for less bandwidth, speeds, other stuff, Multithreaded, Simple question/answer style attack control, comprehensive attack options. BTC: 1LGJhVQeJZ1RQXjkm3VWdJxE4Gz88tk2Y2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This is a "Lite" version of Kollapse. This utility is designed to test a web server for the Null Byte vulnerability. If a web server is vulnerable to the Null Byte attack a Denial of Service (DoS) results. This causes the web page to be unavailable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Outbound sales software Icon
    Outbound sales software

    Unified cloud-based platform for dialing, emailing, appointment scheduling, lead management and much more.

    Adversus is an outbound dialing solution that helps you streamline your call strategies, automate manual processes, and provide valuable insights to improve your outbound workflows and efficiency.
    Learn More
  • 10

    RC4-32.ASM

    Code to brute force the 32-bit key used to RC4 encrypt .pwl files.

    PROJECT HAS MOVED TO GITHUB: https://github.com/alex-georgiou/rc4-32.asm Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br. http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Byte Investigator

    Scripts for parsing and general use in Computer Forensics - Octane Lab

    O projeto Byte Investigator do Octane Labs nasceu com a finalidade de se ter um kit de ferramentas (scripts perl) de parsing de varias estruturas do ambiente Windows (arquivos e estruturas dos file systems). Estas ferramentas poderão ser utilizadas no cotidiano dos profissionais e pesquisadores de segurança nas tratativas de resposta a incidentes de Segurança de Informação e Computação Forense.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Command-line tool to check ADFs (Amiga Disk Files) for errors and viruses. A binary is included for Windows users; Linux users are advised to compile the application themselves. Might also compile under plain DOS; but BE WARNED! When you scan files already renamed by the TOSEC standard, consider that file names may become insanely long in no time. --UPDATE OCTOBER 2014-- This project is currently suspended! I can't currently find the time to fix/update anything with this program...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    StopDoS protects your server from various DoS attacks. StopDoS has possibility to notify(via e-mail or sms) you when your server experiencing attack and/or block attacker. Try it!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This is a utility to publish text with Chinese Double Byte Characters on the Web. It can add space between Chinese characters so that the browser can break the lines. Available in Perl and QBasic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB