dheater

Key exchange exploit

An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service

D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)

GitHub

186 stars
8 watching
27 forks
Language: Python
last commit: 7 months ago
Linked from 1 awesome list

attackddosddos-attackddos-attack-toolddos-attack-toolsddos-tooldenial-of-servicedhediffie-hellman-algorithmdiffie-hellman-groupsdiffie-hellman-keydos-attackdos-attack-tooloverloadingpocsecuritysecurity-toolssshssltls

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
dalek-cryptography/x25519-dalek An implementation of elliptic curve Diffie-Hellman key exchange using the x25519 curve 331
0xjcn/damn-vulnerable-defi-v3-ctf A DeFi protocol with intentional vulnerabilities for testing and learning secure smart contract development 25
r3dxpl0it/cve-2018-4407 Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. 35
649/memcrashed-ddos-exploit A tool designed to send forged UDP packets to vulnerable Memcached servers, exploiting them in a DDoS attack. 1,336
hynekpetrak/sshame A tool for brute-forcing SSH public-key authentication to test penetration testing and ethical hacking scenarios. 75
maxamel/gdh A Java library implementing a generalized Diffie-Hellman key exchange protocol for multiple parties 32
hyperclaw79/hulk-v3 A tool for launching Distributed Denial of Service (DDoS) attacks on HTTPS servers. 357
hrbrmstr/cfhttr A package that bypasses Cloudflare's anti-DDoS protection scheme by simulating the JavaScript challenge required to access some files 9
mpgn/cve-2019-0192 A proof of concept project demonstrating a remote code execution vulnerability in Apache Solr via deserialization of untrusted data 209
hardik05/damn_vulnerable_c_program An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. 676
irsl/gcp-dhcp-takeover-code-exec A proof-of-concept code execution project exploiting an unpatched vulnerability in Google Compute Engine's ISC DHCP software to gain root access via SSH keys added by the google_guest_agent. 533
r3nt0n/torddos Automates DDoS attacks on websites using the Tor network and Python 315
spencerdodd/kernelpop Automated framework for discovering and exploiting kernel vulnerabilities on Linux and macOS. 687
scumjr/dirtycow-vdso A Proof-of-Concept for exploiting a vulnerability in the Linux vDSO, allowing arbitrary code execution. 491
mschwager/dhcpwn A tool used to test DHCP IP exhaustion attacks by sending spoofed UDP requests to a DHCP server. 667