 dheater
 dheater 
 Key exchange exploit
 An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
187 stars
 8 watching
 26 forks
 
Language: Python 
last commit: over 1 year ago 
Linked from   1 awesome list  
  attackddosddos-attackddos-attack-toolddos-attack-toolsddos-tooldenial-of-servicedhediffie-hellman-algorithmdiffie-hellman-groupsdiffie-hellman-keydos-attackdos-attack-tooloverloadingpocsecuritysecurity-toolssshssltls 
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | An implementation of elliptic curve Diffie-Hellman key exchange using the x25519 curve | 331 | 
|  | A DeFi protocol with intentional vulnerabilities for testing and learning secure smart contract development | 25 | 
|  | Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. | 35 | 
|  | A tool designed to send forged UDP packets to vulnerable Memcached servers, exploiting them in a DDoS attack. | 1,340 | 
|  | A tool for brute-forcing SSH public-key authentication to test penetration testing and ethical hacking scenarios. | 74 | 
|  | A Java library implementing a generalized Diffie-Hellman key exchange protocol for multiple parties | 32 | 
|  | A tool for launching Distributed Denial of Service (DDoS) attacks on HTTPS servers. | 361 | 
|  | A package that bypasses Cloudflare's anti-DDoS protection scheme by simulating the JavaScript challenge required to access some files | 9 | 
|  | A proof of concept project demonstrating a remote code execution vulnerability in Apache Solr via deserialization of untrusted data | 209 | 
|  | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 681 | 
|  | A proof-of-concept code execution project exploiting an unpatched vulnerability in Google Compute Engine's ISC DHCP software to gain root access via SSH keys added by the google_guest_agent. | 534 | 
|  | Automates DDoS attacks on websites using the Tor network and Python | 323 | 
|  | Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. | 687 | 
|  | A Proof-of-Concept for exploiting a vulnerability in the Linux vDSO, allowing arbitrary code execution. | 492 | 
|  | A tool used to test DHCP IP exhaustion attacks by sending spoofed UDP requests to a DHCP server. | 668 |