exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 305 RSS Feed

Files

Simple SNMP Bulk Request Denial Of Service Tool
Posted Aug 31, 2012
Authored by Anestis Bechtsoudis

This code is a denial of service tool that performs bulk SNMP requests with large string responses.

tags | denial of service
SHA-256 | 8263a8b0e91e7c1fb9835de0cdefc40e98aee1db6099327458651b13402c03e9
DNS Denial Of Service Tool
Posted Jul 19, 2012

This is a simple snippet of c code that can be used for creating a denial of service condition against a DNS server.

tags | denial of service
SHA-256 | 23d955165e262da83e17e578062db6045a5487a02f461e22bbd4b3d9d5a162af
Wikiboat Automated Distributed Denial Of Service
Posted Jun 23, 2012
Authored by WizZ

This is the html code used for the Wikiboat automated distributed denial of service tool.

tags | denial of service
systems | linux
SHA-256 | 69387a4ae6f8a662b4fce340b25dca7da73b81267665ab3e88b9f91f4edb4dc4
HULK - Http Unbearable Load King
Posted May 18, 2012
Authored by Barry Shteiman | Site sectorix.com

HULK is a web server denial of service tool written for research purposes. It is designed to generate volumes of unique and obfuscated traffic at a webserver, bypassing caching engines and therefore hitting the server's direct resource pool.

tags | tool, web, denial of service, python
SHA-256 | d9c1a1a5082375991a0038f05e0d43d9b63ed9ae620deaea9690c624aa50a37a
Kaiten IRC Bot Rewritten
Posted Jan 22, 2012
Authored by Simone Luchetta

This is the Kaiten IRC denial of service bot that has been modified to include various newer denial of service attacks.

tags | denial of service
SHA-256 | a16a8651f2c3c16637fc46c4b0a98cdc433572c94360d7915b6f918896478d45
HTTP Bog 1.0.0.0
Posted Jun 18, 2011
Authored by AutoSec Tools | Site autosectools.com

HTTP Bog is a slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses. Requires .NET 3.5. Written in C#.

tags | web, denial of service
SHA-256 | 21b49d0423d9dfda5e5ab125414ed0306b679f58a4bc84e2b5e2625ab7253788
DNS Distributed Reflected Denial Of Service Tool
Posted Jun 13, 2011
Authored by noptrix | Site nullsecurity.net

Proof of concept code that demonstrates a distributed DNS reflection denial of service attack.

tags | denial of service, proof of concept
SHA-256 | 7be16c76bc50e0af17b21f118fbb3b1ea2b08b93b013a433d54cec209c969b5a
Tor's Hammer - Slow POST Denial Of Service Testing Tool
Posted Mar 2, 2011
Authored by entropy | Site phiral.net

Tor's Hammer is a slow post dos testing tool written in Python. It can also be run through the Tor network to be anonymized. If you are going to run it with Tor it assumes you are running Tor on 127.0.0.1:9050. Kills most unprotected web servers running Apache and IIS via a single instance. Kills Apache 1.X and older IIS with ~128 threads, newer IIS and Apache 2.X with ~256 threads.

tags | web, denial of service, python
systems | linux
SHA-256 | 00127b3a7c45407764e28730a9732e9e09810e26b1733841424227c6b35ae4f8
PySpoof Packet Spoofer / Flooder
Posted Feb 7, 2011
Authored by entropy

PySpoof is a threaded packet spoofer / flooder for Linux. Written in Python.

tags | denial of service, python
systems | linux
SHA-256 | 0bdccc9c5f22ee57cd6eb1d6883a4ad869d7e9e730faaffc90228737eeda43a7
POST-it Denial Of Service Tool 1.1.0
Posted Feb 1, 2011
Authored by Zodiac, Hex

POST-it is a both proof of concept and fully functioning code, showing how the timeout-weaknesses in HTTP POST protocol can be leveraged to cause Apache servers to fail. Written in Python.

tags | web, denial of service, protocol, proof of concept, python
SHA-256 | 8d9389ff869470234e1584104d6888b43edeaaaf3d0a9e51e43cdd61fc4a3cbd
R-U-Dead-Yet Denial Of Service Tool 2.2
Posted Jan 21, 2011
Authored by Raviv Raz | Site code.google.com

R-U-Dead-Yet is a universal DoS attack tool written in Python. It will attack all and any web applications / servers. Runs either in unattended mode using configuration file or in an interactive auto-discover-web-forms mode.

Changes: RUDY handles ports other than 80 now.
tags | web, denial of service, python
systems | unix
SHA-256 | e9dbd25e93a96deead6d457fea311264726fcd2e8c1c46a1ac23a3359fa8f491
R-U-Dead-Yet Denial Of Service Tool 2.1
Posted Jan 8, 2011
Authored by Raviv Raz | Site code.google.com

R-U-Dead-Yet is a universal DoS attack tool written in Python. It will attack all and any web applications / servers. Runs either in unattended mode using configuration file or in an interactive auto-discover-web-forms mode.

Changes: HTML parsing issue has been corrected.
tags | web, denial of service, python
systems | unix
SHA-256 | a9986844f6a662337e1caffbe30956fb6db09d2fb81a99ef039d19f99c946275
OWASP HTTP Post Denial Of Service Tool 3
Posted Nov 25, 2010
Site owasp.org

This OWASP HTTP Post denial of service tool was created for testing web applications for availability concerns from HTTP GET and HTTP POST denial of service attacks.

tags | web, denial of service
SHA-256 | a1be65a2e180114a51ec0b5aec453b5276d0e3c5844a6ec4e6fcb27016250752
R-U-Dead-Yet Denial Of Service Tool 2
Posted Nov 22, 2010
Authored by Raviv Raz | Site code.google.com

R-U-Dead-Yet is a universal DoS attack tool written in Python. It will attack all and any web applications / servers. Runs either in unattended mode using configuration file or in an interactive auto-discover-web-forms mode.

Changes: Concurrent connections using parallel processes enables multi-cpu optimization. Interactive text menu allows almost anybody to fire up R.U.D.Y. Various other improvements.
tags | web, denial of service, python
systems | unix
SHA-256 | 0934fc8b080a771ea4a6bedbffd23fb5e2c8826cc242d2c97c3618afc8383718
R-U-Dead-Yet Denial Of Service Tool
Posted Nov 16, 2010
Authored by Raviv Raz | Site code.google.com

R-U-Dead-Yet is a universal DoS attack tool written in Python. It will attack all and any web applications / servers. Runs either in unattended mode using configuration file or in an interactive auto-discover-web-forms mode.

tags | web, denial of service, python
systems | unix
SHA-256 | 9f9da8c3e7d66dea4780fdadc6ac9a60664d42386837c1e7ed714dff93c9e186
Reverberation UDP Echo Denial Of Service Tool
Posted Mar 9, 2010
Authored by l0om | Site excluded.org

Reverberation is a proof of concept denial of service tool that makes use of UDP echo servers.

tags | denial of service, udp, proof of concept
SHA-256 | 14699b1e6d5e32f01ee4e0376b52b221fce84d7267f7896bf740da0191cc46ba
Slowloris Denial Of Service Tool
Posted Jun 17, 2009
Authored by RSnake

Slowloris helps identify the timeout windows of a HTTP server or Proxy server, can bypass httpready protection and ultimately performs a fairly low bandwidth denial of service. It has the added benefit of allowing the server to come back at any time (once the program is killed), and not spamming the logs excessively. It also keeps the load nice and low on the target server, so other vital processes do not die unexpectedly, or cause alarm to anyone who is logged into the server for other reasons.

tags | web, denial of service
systems | windows
SHA-256 | 62b88cce241ebd4b056497752e9844e93aa853e48750a98de0f5fe62a2ec6ddf
udp.pl
Posted Feb 20, 2009
Authored by Odix

Udp.pl is a simple UDP flooder written in perl.

tags | denial of service, udp, perl
SHA-256 | a2843c6ee7336f1f9449d88e17b2df96a48cbdf5ad4472388d52ed69c8b4c70a
uBlueDos.c
Posted Mar 12, 2008
Authored by WarGame

Simple denial of service tool for Bluetooth.

tags | denial of service
SHA-256 | b3ede84361ce35da5b7589799061714cd9bfa7b2d59baae8d80291b00250bd31
BlueDos.c
Posted Jan 11, 2008
Authored by WarGame

Simple denial of service tool for Bluetooth.

tags | denial of service
SHA-256 | 954a2fa30290331cb5a96ae6d6169a029a08cc0ecde27b4891c02902e0ba350e
alice-0.1.tar.gz
Posted Nov 13, 2007
Authored by CtrlAltCa

This code creates standard dns A queries with a spoofed sender ip address. In particular conditions, this can lead to a denial of service (answers weighs more than queries). Based on snoof.c.

tags | denial of service, spoof
SHA-256 | 4f3cf1a815cd50f51ad172741ec825abc82c283f6dc30dbe24f0d171dbb50cdf
ymsg8boot.tgz
Posted Sep 10, 2007
Authored by slick | Site rstzone.org

Yahoo! Messenger booting exploit that makes use of a malformed code presented during file transfer.

tags | denial of service
SHA-256 | 0f25f802b23d56ffae0ce643b178de303c3eb8ede122c6997faf9fdfed3b6651
drdos.txt
Posted Jun 6, 2007
Authored by whoppix

Distributed reflection denial of service program.

tags | denial of service
SHA-256 | ef9e2f9bd14654663df3c9614b561a442e5e3eb4a14aba3c1cdbe1263f00f448
ollycrash.zip
Posted May 31, 2007
Authored by BoR0

OllyDbg version 1.10 suffers from a denial of service condition when seeing certain special bytes.

tags | denial of service
SHA-256 | f538d17c5d770dce03b70daa622a7f21db59dd5c1b225ea9cb13d71ee7f8ef93
suf-v1.1.zip
Posted May 21, 2007
Site loranbase.com

This program can send spoofed UDP packets with a user specified data, source and destination port. For Windows XP versions prior to SP2. Includes Delphi source code.

tags | denial of service, udp, spoof
systems | windows
SHA-256 | bd4242c6c7bce4fc24809fa15081e36d14cdf2202cab3d216c8c38a3bc162b6d
Page 3 of 13
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Nation-State Hackers Exploit Cisco Firewall Zero Days To Backdoor Government Networks
Posted Apr 25, 2024

tags | headline, hacker, government, cyberwar, cisco, backdoor
FTC Sending $5.6 Million To Ring Customers Over Security Failures
Posted Apr 25, 2024

tags | headline, government, privacy, usa, amazon, flaw
Palo Alto Networks Shares Remediation Advice
Posted Apr 25, 2024

tags | headline, flaw
Russia, Iran Pose Most Aggressive Threat To 2024 Election
Posted Apr 25, 2024

tags | headline, government, usa, russia, fraud, cyberwar, iran
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close