Showing 122 open source projects for "dos attack engine"

View related business solutions
  • SKUDONET Open Source Load Balancer Icon
    SKUDONET Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
  • Employee monitoring software with screenshots Icon
    Employee monitoring software with screenshots

    Clear visibility and insights into how employees work. Even remotely

    Our computer monitoring software allows employees, field contractors, and freelancers to manually clock in when they begin working on an assignment. The application will take screenshots randomly or at set intervals, which allows employers to observe the work process. The application only tracks activity when the employee is clocked in. No spying, only transparency.
  • 1
    DDoS/Dos Attack Simulator

    DDoS/Dos Attack Simulator

    Distributed Denial of Service Attack Simulator

    DDoS/DoS Attack Simulator is powerful Python-based software used for attacking servers, hosts, and websites using traffic. It disrupts the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. A server that does not have protection against it can experience extremely slow performance due to all of the traffic it sends. Extensive features will be added! Mega Feature - > DoS Tool. [ 1 ] Bugs Fixes...
    Leader badge
    Downloads: 144 This Week
    Last Update:
    See Project
  • 2
    OpenRA Game Engine

    OpenRA Game Engine

    Open Source real-time strategy game engine for early Westwood games

    Open Source real-time strategy game engine for early Westwood games such as Command & Conquer: Red Alert written in C# using SDL and OpenGL. Runs on Windows, Linux, *BSD and Mac OS X. Updated gameplay designed around modern features like attack-move, unit veterancy, and the fog of war. Online play with full support for mods and custom maps. Updated campaigns with new objectives and difficulties. Natively supported on Windows, macOS and Linux. Fully open source and developed in the open...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 3
    airgeddon

    airgeddon

    This is a multi-use bash script for Linux systems

    airgeddon is an alive project growing day by day. Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing. DoS over wireless networks using different methods (mdk3, mdk4, aireplay-ng). "DoS Pursuit mode" is available to avoid AP channel hopping (available also on DoS performed on Evil Twin attacks). Full support for 2.4Ghz and 5Ghz bands. Assisted WPA/WPA2 personal networks Handshake file and PMKID capturing. Cleaning and optimizing Handshake captured files...
    Downloads: 51 This Week
    Last Update:
    See Project
  • 4
    thc-hydra

    thc-hydra

    Shows how easy it would be to gain unauthorized access to a system

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallelized connects. It was tested to compile cleanly on Linux, Windows/Cygwin...
    Downloads: 126 This Week
    Last Update:
    See Project
  • AI-based, Comprehensive Service Management for Businesses and IT Providers Icon
    AI-based, Comprehensive Service Management for Businesses and IT Providers

    Modular solutions for change management, asset management and more

    ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
  • 5
    sqlmap

    sqlmap

    Automatic SQL injection and database takeover tool

    sqlmap is a powerful, feature-filled, open source penetration testing tool. It makes detecting and exploiting SQL injection flaws and taking over the database servers an automated process. sqlmap comes with a great range of features that along with its powerful detection engine make it the ultimate penetration tester. It offers full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, and many other database management systems. It also...
    Downloads: 79 This Week
    Last Update:
    See Project
  • 6
    Shennina

    Shennina

    Automating Host Exploitation with AI

    ... to identify recommended exploits for the attacks, and then attempts to test and attack the targets. If the attack succeeds, Shennina proceeds with the post-exploitation phase. The AI engine is initially trained against live targets to learn reliable exploits against remote services. Shennina also supports a "Heuristics" mode for identfying recommended exploits.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Good Man in the Middle

    Good Man in the Middle

    Rule-based MITM engine. Rewriting, redirecting and rejecting on HTTP

    Rule-based MITM engine. Rewriting, redirecting and rejecting on HTTP(S) requests and responses, supports JavaScript.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Coraza

    Coraza

    OWASP Coraza WAF is a golang modsecurity compatible firewall library

    Coraza is an open-source, enterprise-grade, high-performance Web Application Firewall (WAF) ready to protect your beloved applications. It is written in Go, supports ModSecurity SecLang rulesets and is 100% compatible with the OWASP Core Rule Set. Coraza is a drop-in alternative to replace the soon-to-be abandoned Trustwave ModSecurity Engine and supports industry-standard SecLang rule sets. Coraza runs the OWASP Core Rule Set (CRS) to protect your web applications from a wide range of attacks...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    KubeArmor

    KubeArmor

    Runtime Security Enforcement System

    KubeArmor is a runtime Kubernetes security engine. It uses eBPF and Linux Security Modules(LSM) for fortifying workloads based on Cloud Containers, IoT/Edge, and 5G networks. It enforces policy-based controls. KubeArmor is a runtime Kubernetes security engine. It uses eBPF and Linux Security Modules(LSM) for fortifying workloads based on Cloud Containers, IoT/Edge, and 5G networks. It enforces policy-based controls. KubeArmor lessens the attack surface on pods, containers, and virtual machines...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 10
    Kubernetes Goat

    Kubernetes Goat

    Kubernetes Goat is a "Vulnerable by Design" cluster environment

    Learn to attack or find security issues, misconfigurations, and real-world hacks within containers, Kubernetes, and cloud-native environments. Enumerate, exploit, and gain access to the workloads right from your browser. Understand how attackers think, work, and exploit security issues, and apply these learnings to detect and defend them. Also, learn best practices, defenses, and tools to mitigate, and detect in the real world. Learn the hacks, defenses, and tools. So that you can think like...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    High Orbit Ion Cannon V2
    ANTI-VIRUS MUST BE TURNED OFF TO WORK!
    Downloads: 382 This Week
    Last Update:
    See Project
  • 12
    Hexen II: Hammer of Thyrion

    Hexen II: Hammer of Thyrion

    A cross-platform port of Hexen II game.

    Hammer of Thyrion (uHexen2) is a cross-platform port of Raven Software's Hexen II source. It is based on an older linux port, Anvil of Thyrion. HoT includes countless bug fixes, improved music, sound and video modes, opengl improvements, support for many operating systems and architectures, and documentation among many others.
    Leader badge
    Downloads: 416 This Week
    Last Update:
    See Project
  • 13
    4tH compiler

    4tH compiler

    A Forth compiler with a little difference

    4tH is a Forth compiler with a little difference. Instead of the standard Forth engine it features a conventional compiler. 4tH is a very small compiler that can create bytecode, C-embeddable bytecode, standalone executables, but also works fine as a scripting language. It supports about 95% of the ANS Forth CORE wordset and features conditional compilation, pipes, files, assertions, forward declarations, enumerations, structures, suspended execution, recursion, include files, etc. It comes...
    Leader badge
    Downloads: 69 This Week
    Last Update:
    See Project
  • 14
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15
    Project 16

    Project 16

    A 16 bit style game on the 16-bit IBM XT.

    A project to make a new 16 bit style dos game that can run on old and new hardware!!! It is planned to be a tile engine game for FreeDOS utilizing mode X of VGA and using the YM3812/OPL2 and YMF262/OPL3 chip to full capabilities! more details later!
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    jynew

    jynew

    Heros of Jin Yong 3D Remastered

    Heros of Jin Yong 3D Remastered is an open world RPG game with turn-based battle system. It is a non-profit game project which remastered the classic game Legends of Kim-Yong. This project supplies a framework for MODs and secondary development. You can play it on PC, Mac, mobile platform(or other supported platform).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    My MOD's for 2,5D-games: Duke 3D&more

    My MOD's for 2,5D-games: Duke 3D&more

    My addon for GAME: WW2GI,N.A.M.,Duke Nukem 3D,Blood,Shadow Warrior

    Hi, about few years ago I+ my friends doing some graphic MODS/addon's for old 2,5D DOS-games on BUILD ENGINE (Ken Silverman) like: Duke Nukem 3D, N.A.M. , WW2GI , Blood, Shadow Warrior . Also some gfx-modifications for ID Software DOS-games: DOOM, Quake I. We use some mod's-modifications other Authors + MY own works,arts,sounds,music,animation, my sprites,titlepics,CON-hacking etc. There My N E W L I N K S for free downloading
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    ufonet

    ufonet

    UFONet - Denial of Service Toolkit

    UFONet - Is a set of hacktivist tools that allow launching coordinated DDoS and DoS attacks and combine both in a single offensive. It also works as an encrypted DarkNET to publish and receive content by creating a global client/server network based on a direct-connect P2P architecture. + FAQ: https://ufonet.03c8.net/FAQ.html -------------------------------------------- -> UFONet-v1.8 [DPh] "DarK-PhAnT0m!" (.zip) -> md5 = [ c8ab016f6370c8391e2e6f9a7cbe990a ] -> UFONet-v1.8 [DPh] "DarK...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 19
    Pooch

    Pooch

    Pooch is a port of MBF to SDL2.

    Pooch is an extremely conservative MBF port to SDL2. It is identical to DOS MBF. It is NOT savegame compatible with DOS MBF. Please note, Pooch is NOT compatible with the so called 'MBF-compatible' wads. This is a fantasy some mod authors have that actually makes no sense. Pooch is compatible with all wads that were compatible with DOS MBF, no more, no less. Pooch does contain a Launcher for Windows and macOS. Pooch has two versions, a normal version and an accessibility version, which...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Commander Genius

    Commander Genius

    Commander Keen Interpreter

    This is a fork of CloneKeen. It fully interprets the classic dos games Commander Keen 1-6 including some fanmade mods and adds some nice twists like smoother gameplay, some special graphical effects and also music, which was missing in the first trilogy. Use our High Quality Pack and enjoy the Commander Keen series in a new way.
    Leader badge
    Downloads: 164 This Week
    Last Update:
    See Project
  • 21

    T50

    Very fast network stress tool

    the fatest network packet injector *WARNING*: Don't use versions prior to 5.8. There is a major bugs recently discovered and fixed in this release. *WARNING*: The GitHub account containing the T50 project was deleted permanently. The new repository (with all commits, comments, "merge requests", ...) is already available at GitLab: https://gitlab.com/fredericopissarra/t50 *WARNING*: All older releases, except 5.7.* were DELETED. 5.4.1 and below are Nelson's original source code.
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 22
    DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES !!! ONLY FOR PENTESTING PURPOSES !!!
    Downloads: 21 This Week
    Last Update:
    See Project
  • 23

    openddos-deluxe

    A free Python DDoS script I made for EDUCATIONAL PURPOSES.

    It's probably the best DoS python script out there that is for free (to my knowledge). I made this for educational purposes, It is not under my responsibility if an individual uses my application for illegal purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Hyenae NG

    Hyenae NG

    Advanced Network Packet Generator

    Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms. *** Please check out the latest source from my GitHub repository and check the Build informations. https://github.com/r-richter/hyenae-ng/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    DDOSER

    DDOSER

    Machine that can DDOS servers

    This machine can DDOS any IP. Takes from 2 - 5 Hours to working properly. Good luck! ====SUBMIT ERRORS HERE==== https://forms.gle/9ubmBmhivBBYGgmg7 ========================== [1 April 2020 Patch] The "This program was made with an unlicensed compiler (...)" error will be repaired today! Stay tuned. Thanks to _FoZa_ for reporting me that error! Congrats! LOG 1: That won`t fixed anything so i needed to make another version LOG 2: Fixed :) That made my program which converts files. Now it`s...
    Downloads: 146 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next