dheater
Key exchange exploit
An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
186 stars
8 watching
27 forks
Language: Python
last commit: 7 months ago
Linked from 1 awesome list
attackddosddos-attackddos-attack-toolddos-attack-toolsddos-tooldenial-of-servicedhediffie-hellman-algorithmdiffie-hellman-groupsdiffie-hellman-keydos-attackdos-attack-tooloverloadingpocsecuritysecurity-toolssshssltls
Related projects:
Repository | Description | Stars |
---|---|---|
dalek-cryptography/x25519-dalek | An implementation of elliptic curve Diffie-Hellman key exchange using the x25519 curve | 331 |
0xjcn/damn-vulnerable-defi-v3-ctf | A DeFi protocol with intentional vulnerabilities for testing and learning secure smart contract development | 25 |
r3dxpl0it/cve-2018-4407 | Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. | 35 |
649/memcrashed-ddos-exploit | A tool designed to send forged UDP packets to vulnerable Memcached servers, exploiting them in a DDoS attack. | 1,336 |
hynekpetrak/sshame | A tool for brute-forcing SSH public-key authentication to test penetration testing and ethical hacking scenarios. | 75 |
maxamel/gdh | A Java library implementing a generalized Diffie-Hellman key exchange protocol for multiple parties | 32 |
hyperclaw79/hulk-v3 | A tool for launching Distributed Denial of Service (DDoS) attacks on HTTPS servers. | 357 |
hrbrmstr/cfhttr | A package that bypasses Cloudflare's anti-DDoS protection scheme by simulating the JavaScript challenge required to access some files | 9 |
mpgn/cve-2019-0192 | A proof of concept project demonstrating a remote code execution vulnerability in Apache Solr via deserialization of untrusted data | 209 |
hardik05/damn_vulnerable_c_program | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 676 |
irsl/gcp-dhcp-takeover-code-exec | A proof-of-concept code execution project exploiting an unpatched vulnerability in Google Compute Engine's ISC DHCP software to gain root access via SSH keys added by the google_guest_agent. | 533 |
r3nt0n/torddos | Automates DDoS attacks on websites using the Tor network and Python | 315 |
spencerdodd/kernelpop | Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. | 687 |
scumjr/dirtycow-vdso | A Proof-of-Concept for exploiting a vulnerability in the Linux vDSO, allowing arbitrary code execution. | 491 |
mschwager/dhcpwn | A tool used to test DHCP IP exhaustion attacks by sending spoofed UDP requests to a DHCP server. | 667 |