HULK-v3
DDoS attack launcher
A tool for launching Distributed Denial of Service (DDoS) attacks on HTTPS servers.
Asynchronous HTTP Botnet for Distributed Denial of Service (DDoS)
361 stars
10 watching
85 forks
Language: Python
last commit: about 2 years ago asyncasynchronousddosddos-attackddos-scriptelectronguihttphttpshulknamed-pipesnextronnodejspythonpython3typescriptwebsockets
Related projects:
Repository | Description | Stars |
---|---|---|
| Automates DDoS attacks on websites using the Tor network and Python | 323 |
| A toolkit for creating and managing distributed denial-of-service attacks via network exploitation | 2,231 |
| A CobaltStrike script that integrates DDEAuto Attacks to launch a staged PowerShell CS beacon | 63 |
| A low-level HTTP/2 library for exploiting race conditions in web servers | 153 |
| Automates scanning of HTTP resources in a target network using XML External Entity (XXE) attacks | 37 |
| A package that bypasses Cloudflare's anti-DDoS protection scheme by simulating the JavaScript challenge required to access some files | 9 |
| A tool used to test DHCP IP exhaustion attacks by sending spoofed UDP requests to a DHCP server. | 668 |
| An implementation of a proof-of-concept attack exploiting a vulnerability in Diffie-Hellman key exchange for denial-of-service | 187 |
| A platform for tracking and monitoring UDP-based Distributed Denial of Service attacks | 52 |
| A plugin for Burpsuite that enables advanced web application testing and exploitation techniques | 1,549 |
| A distributed DDoS protection system that uses network policies and scalable architecture to mitigate traffic flooding attacks. | 1,360 |
| A collection of tools and methodologies for identifying vulnerabilities in web applications | 3,698 |
| A tool for sending and analyzing large numbers of HTTP requests to test web application security vulnerabilities. | 1,520 |
| A tool designed to send forged UDP packets to vulnerable Memcached servers, exploiting them in a DDoS attack. | 1,340 |
| A tool used to detect subdomain takeovers in DNS records and identify potential security vulnerabilities. | 2,037 |