Showing 14 open source projects for "byte dos attacker"

View related business solutions
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    jsoniter-scala

    jsoniter-scala

    Scala macros for compile-time generation of safe and ultra-fast JSON

    Scala macros for compile-time generation of safe and ultra-fast JSON codecs. This library had started from macros that reused jsoniter (json-iterator) for Java reader and writer but then the library evolved to have its own core of mechanics for parsing and serialization. The idea to generate codecs by Scala macros and main details was borrowed from Kryo Macros and adapted for the needs of the JSON domain. Validate parsed values safely with the fail-fast approach and clear reporting, provide...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    HighwayHash

    HighwayHash

    Fast strong hash functions: SipHash/HighwayHash

    ...It exposes simple one-shot and streaming APIs, so you can hash short keys or long byte streams with the same function. Typical uses include protecting hash tables that store untrusted keys and authenticating short-lived messages or records in storage systems. Although not a replacement for collision-resistant digests like SHA-2/3, it strikes a pragmatic balance of speed, simplicity, and resistance to common abuse patterns seen in production backends.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Ring

    Ring

    Simple and flexible programming language for applications development

    The Ring is a practical general-purpose multi-paradigm language. The supported programming paradigms are imperative, procedural, object-oriented, declarative using nested structures, functional, meta programming and natural programming. The language is portable (MS-DOS, Windows, Linux, macOS, Android, WebAssembly, Microcontrollers, etc.) and can be used to create Console, GUI, Web, Games and Mobile applications. The language is designed to be simple, small and flexible. Ring is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    StartFlagExploit

    StartFlagExploit

    POC of Android temporary DoS (Android 10 / 11 beta 3)

    The ActivityManagerService (https://androidreverse.wordpress.com/2018/03/11/aosp-activitymanager-and-activitymanagerservice/) is a component of Android that manages the Running Applications, non-system Services, ContentProviders and much more. The StartFlag DoS Exploit sends a manipulated startActivity event telling to start another Application in "native debugging" mode (in our Test we use the PermissionGrant Activtiy wich is marked as not debuggable". A bug in the ActivityManagerService doesn't answer with forwarding a SecurityException to the Attacker, instead it throws the SecurityException without catching it. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    CLASS_DOS_ATTACKER

    CLASS_DOS_ATTACKER

    it is written in Python and perform denial of service Attacks on LAN.

    CLASS_DOS_ATTACKER is a tool written in PYTHON (in a Linux environment) to perform 5 Denial of Service Attack on a LAN: - ICMP FLOOD - TCP SYNFLOOD - ARP Cache Poisonning - DHCP Starvation - WIFI DEAUTHENTIFICATION
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    EbraSha Dos Attacker Ver 4.0

    EbraSha Dos Attacker Ver 4.0

    Custom DOS Attack In Kali Linux

    EbraSha Dos Attacker Ver 4.0 ----------- DESCRIPTION : EbraSha DOS Attacker is a network tool For custom DOS Attack EbraSha DOS Attacker Programming By Ebrahim Shafiei wiTh c++ ##### EbraSha DOS Attacker Site : Www.EbraSha.Org ----------- Features : + Syn Attack + UDP Attack + ICMP Attack + Pars Fuxy Attack Use The : (Syn,RST,PUSH,FIN,ACK,URG,XMAS,YMAS Tcp Flag) + EbraSha Crazy Attack (Send DDOS Fake Attacker To All Computer In Your Network) + EbraSha Black Sails Attack (The Best Option For Dos To Apache , Nginx , IIS , Tomcat , DataBases , RDP , ... ) + Syn Attack + Router CUP Death Attack (Kill The Cpu In A Min ;) ) + Reflected Flood Attack ----------- Copyright : EbraSha Dos Attacker Ver 4.0 Copyright (C) <2015-2017> <Ebrahim Shafiei> This program is free software: But you can not redistribute it and/or modify it under the terms of the Abdal General Private License as published by the Hacking Software Foundation , either version 1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    EbraSha Dos Attacker

    EbraSha Dos Attacker

    Create Simple Dos Attack On A Networks

    EbraSha Dos Attacker Create By Ebrahim Shafiei For Create Simple Dos Attack On A Networks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Falcon Attacker

    Interesting multithreaded, customizable, simple denial of service tool

    Falcon Atttacker DoS Tool. Features: Choosable DNS/IP, PORT, Page, Server Timeout, Threads, Time Between Headers. POST attacks, GET attacks, TCP flood, ICMP flood, modem hangup ping exploit flood, DNS-to-IP option for less bandwidth, speeds, other stuff, Multithreaded, Simple question/answer style attack control, comprehensive attack options. BTC: 1LGJhVQeJZ1RQXjkm3VWdJxE4Gz88tk2Y2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This is a "Lite" version of Kollapse. This utility is designed to test a web server for the Null Byte vulnerability. If a web server is vulnerable to the Null Byte attack a Denial of Service (DoS) results. This causes the web page to be unavailable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10

    RC4-32.ASM

    Code to brute force the 32-bit key used to RC4 encrypt .pwl files.

    PROJECT HAS MOVED TO GITHUB: https://github.com/alex-georgiou/rc4-32.asm Code to brute force the 32-bit key used to RC4 encrypt .pwl files. Assembles to a 992 byte .COM file using the Intel Architecture Assembler v1.0 Copyright (c) 1998 augusto at dcc.ufmg.br. http://web.archive.org/web/19981205090800/http://www.dcc.ufmg.br/~augusto/project/iasm.zip
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Byte Investigator

    Scripts for parsing and general use in Computer Forensics - Octane Lab

    O projeto Byte Investigator do Octane Labs nasceu com a finalidade de se ter um kit de ferramentas (scripts perl) de parsing de varias estruturas do ambiente Windows (arquivos e estruturas dos file systems). Estas ferramentas poderão ser utilizadas no cotidiano dos profissionais e pesquisadores de segurança nas tratativas de resposta a incidentes de Segurança de Informação e Computação Forense.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Command-line tool to check ADFs (Amiga Disk Files) for errors and viruses. A binary is included for Windows users; Linux users are advised to compile the application themselves. Might also compile under plain DOS; but BE WARNED! When you scan files already renamed by the TOSEC standard, consider that file names may become insanely long in no time. --UPDATE OCTOBER 2014-- This project is currently suspended! I can't currently find the time to fix/update anything with this program...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    StopDoS protects your server from various DoS attacks. StopDoS has possibility to notify(via e-mail or sms) you when your server experiencing attack and/or block attacker. Try it!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This is a utility to publish text with Chinese Double Byte Characters on the Web. It can add space between Chinese characters so that the browser can break the lines. Available in Perl and QBasic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB