Denial of Service (DoS) Attack Using dSniff

0

A Denial-of-Service (DoS) attack using dSniff, aims to bring down a computer system or network so that its intended users cannot access it. DoS attacks achieve this by sending the target excessive traffic or information that causes a crash.  Requirements Linux machine ( I used Kali Linux) Victim OS (Virtual or Real Machine) dSniff tool 1) Installation of dSniff Install a dSniff using the command...

E-Commerce Data: The Secret Behind Any Successful E-Commerce Business

0

In the 21st century, data is a valuable asset for businesses operating in all industries, including E-Commerce, health, travel, etc. Clive Humby, a data science entrepreneur, coined the phrase data is the new oil in 2006. Similar to oil, data is invaluable in its raw condition; rather, value is taken when it is collected quickly and accurately and is...

Nuclearpond : A Utility Leveraging Nuclei To Perform Internet Wide Scans For The Cost Of A Cup Of Coffee

0

Nuclear Pond is used to leverage Nuclei in the cloud with unremarkable speed, flexibility, and perform internet wide scans for far less than a cup of coffee. It leverages AWS Lambda as a backend to invoke Nuclei scans in parallel, choice of storing json findings in s3 to query with AWS Athena, and is easily one of the cheapest ways...

PowerMeUp : A Small Library Of Powershell Scripts For Post Exploitation That You May Need Or Use!

0

This is a powershell reverse shell that executes the commands and or scripts that you add to the powerreverse.ps1 file as well as a small library of Post-Exploitation scripts. This also can be used for post exploitation and lateral movement even. Please use at your own risk I am not and will not be responsible for your actions. Also...

Striker : A Command And Control (C2)

0

Striker is a simple Command and Control (C2) program. This project is under active development. Most of the features are experimental, with more to come. Expect breaking changes. Features A) Agents Native agents for linux and windows hosts. Self-contained, minimal python agent should you ever need it. HTTP(s) channels. Aynchronous tasks execution. Support for multiple redirectors, and can fallback to others when active one goes down. B) Backend...

Katana : A Next-Generation Crawling And Spidering Framework

0

Features: Fast And fully configurable web crawling Standard and Headless mode support JavaScript parsing / crawling Customizable automatic form filling Scope control - Preconfigured field / Regex Customizable output - Preconfigured fields INPUT - STDIN, URL and LIST OUTPUT - STDOUT, FILE and JSON Installation katana requires Go 1.18 to install successfully. To install, just run the below command or download pre-compiled binary from release page. go install github.com/projectdiscovery/katana/cmd/katana@latest More options...

UDPX : Fast And Lightweight, UDPX Is A Single-Packet UDP Scanner

0

UDPX is a fast And Lightweight, UDPX Is A Single-Packet UDP Scanner Written In Go That Supports The Discovery Of Over 45 Services With The Ability To Add Custom Ones Fast and lightweight, UDPX is a single-packet UDP scanner written in Go that supports the discovery of over 45 services with the ability to add custom ones. It is easy...

Wa-Tunnel : Tunneling Internet Traffic Over Whatsapp

0

Disclaimer Using this library may get your WhatsApp account banned, use with a temporary number or at your own risk. This is a Baileys based piece of code that lets you tunnel TCP data through two Whatsapp accounts. This can be usable in different situations, for example network carriers that give unlimited whatsapp data or airplanes where you also get unlimited social...

Scriptkiddi3 – Streamline Your Recon And Vulnerability Detection Process With SCRIPTKIDDI3, A Recon And Initial Vulnerability Detection Tool Built Using Shell Script And Open Source Tools

0

SCRIPTKIDDI3,Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using shell script and open source tools. Introducing SCRIPTKIDDI3, a powerful recon and initial vulnerability detection tool for Bug Bounty Hunters. Built using a variety of open-source tools and a shell script, SCRIPTKIDDI3 allows you to quickly and efficiently run a scan on...

Nmap-API : Uses Python3.10, Debian, python-Nmap, And Flask Framework To Create A Nmap API

0

Nmap-API uses python3.10, Debian, python-Nmap, and flask framework to create a Nmap API that can do scans with a good speed online and is easy to deploy. This is a implementation for our college PCL project which is still under development and constantly updating. API Reference Get all items GET /api/p1/{username}:{password}/{target} GET /api/p2/{username}:{password}/{target} GET /api/p3/{username}:{password}/{target} GET /api/p4/{username}:{password}/{target} ...