Showing 8 open source projects for "byte dos attacker"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    jsoniter-scala

    jsoniter-scala

    Scala macros for compile-time generation of safe and ultra-fast JSON

    Scala macros for compile-time generation of safe and ultra-fast JSON codecs. This library had started from macros that reused jsoniter (json-iterator) for Java reader and writer but then the library evolved to have its own core of mechanics for parsing and serialization. The idea to generate codecs by Scala macros and main details was borrowed from Kryo Macros and adapted for the needs of the JSON domain. Validate parsed values safely with the fail-fast approach and clear reporting, provide...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    HighwayHash

    HighwayHash

    Fast strong hash functions: SipHash/HighwayHash

    ...It exposes simple one-shot and streaming APIs, so you can hash short keys or long byte streams with the same function. Typical uses include protecting hash tables that store untrusted keys and authenticating short-lived messages or records in storage systems. Although not a replacement for collision-resistant digests like SHA-2/3, it strikes a pragmatic balance of speed, simplicity, and resistance to common abuse patterns seen in production backends.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Ring

    Ring

    Simple and flexible programming language for applications development

    The Ring is a practical general-purpose multi-paradigm language. The supported programming paradigms are imperative, procedural, object-oriented, declarative using nested structures, functional, meta programming and natural programming. The language is portable (MS-DOS, Windows, Linux, macOS, Android, WebAssembly, Microcontrollers, etc.) and can be used to create Console, GUI, Web, Games and Mobile applications. The language is designed to be simple, small and flexible. Ring is...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4
    CLASS_DOS_ATTACKER

    CLASS_DOS_ATTACKER

    it is written in Python and perform denial of service Attacks on LAN.

    CLASS_DOS_ATTACKER is a tool written in PYTHON (in a Linux environment) to perform 5 Denial of Service Attack on a LAN: - ICMP FLOOD - TCP SYNFLOOD - ARP Cache Poisonning - DHCP Starvation - WIFI DEAUTHENTIFICATION
    Downloads: 13 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5

    Falcon Attacker

    Interesting multithreaded, customizable, simple denial of service tool

    Falcon Atttacker DoS Tool. Features: Choosable DNS/IP, PORT, Page, Server Timeout, Threads, Time Between Headers. POST attacks, GET attacks, TCP flood, ICMP flood, modem hangup ping exploit flood, DNS-to-IP option for less bandwidth, speeds, other stuff, Multithreaded, Simple question/answer style attack control, comprehensive attack options. BTC: 1LGJhVQeJZ1RQXjkm3VWdJxE4Gz88tk2Y2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This is a "Lite" version of Kollapse. This utility is designed to test a web server for the Null Byte vulnerability. If a web server is vulnerable to the Null Byte attack a Denial of Service (DoS) results. This causes the web page to be unavailable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Byte Investigator

    Scripts for parsing and general use in Computer Forensics - Octane Lab

    O projeto Byte Investigator do Octane Labs nasceu com a finalidade de se ter um kit de ferramentas (scripts perl) de parsing de varias estruturas do ambiente Windows (arquivos e estruturas dos file systems). Estas ferramentas poderão ser utilizadas no cotidiano dos profissionais e pesquisadores de segurança nas tratativas de resposta a incidentes de Segurança de Informação e Computação Forense.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    This is a utility to publish text with Chinese Double Byte Characters on the Web. It can add space between Chinese characters so that the browser can break the lines. Available in Perl and QBasic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB