Search Results for "ip attack python" - Page 5

Showing 236 open source projects for "ip attack python"

View related business solutions
  • Go from Data Warehouse to Data and AI platform with BigQuery Icon
    Go from Data Warehouse to Data and AI platform with BigQuery

    Build, train, and run ML models with simple SQL. Automate data prep, analysis, and predictions with built-in AI assistance from Gemini.

    BigQuery is more than a data warehouse—it's an autonomous data-to-AI platform. Use familiar SQL to train ML models, run time-series forecasts, and generate AI-powered insights with native Gemini integration. Built-in agents handle data engineering and data science workflows automatically. Get $300 in free credit, query 1 TB, and store 10 GB free monthly.
    Try BigQuery Free
  • Cut Cloud Costs with Google Compute Engine Icon
    Cut Cloud Costs with Google Compute Engine

    Save up to 91% with Spot VMs and get automatic sustained-use discounts. One free VM per month, plus $300 in credits.

    Save on compute costs with Compute Engine. Reduce your batch jobs and workload bill 60-91% with Spot VMs. Compute Engine's committed use offers customers up to 70% savings through sustained use discounts. Plus, you get one free e2-micro VM monthly and $300 credit to start.
    Try Compute Engine
  • 1
    Ball Fight
    In this game you have to destroy as many enemy balls as possible by colliding with them, or using special powers. Each ball raises its own resistance and its own attack power when it speeds up. So the faster you go, the more you are protected against enemy attacks, and greater becomes your attack power against enemy balls! This is valid for your enemies too! See the ingame help for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Zippy-Ip-Scanner

    Zippy-Ip-Scanner

    Free, open-source IP scanner

    Zippy Ip Scanner is a free, open-source cross-platform IP scanning application written in python.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Ball Fight
    In this game you have to destroy as much enemy balls as possible by colliding with them, or using special powers. Each ball raises its own resistance and its own attack power when it speeds up. So the faster you go, the more you are protected against enemy attacks, and greater becomes your attack power against enemy balls! This is valid for your enemies too! See the ingame help for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Config Backup for F5

    Backup program for F5 Big IP devices

    This project is a Python program with PHP web UI to manage daily backups of F5 BigIP devices. It also is available as a turnkey VMware appliance requiring no Linux skills to use. Disclaimer - This project is an independent work under the GPL v2 license and is NOT provided by or supported by F5 Networks. It is provided as is with no warranty. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 99.99% Uptime for MySQL and PostgreSQL on Google Cloud Icon
    99.99% Uptime for MySQL and PostgreSQL on Google Cloud

    Enterprise Plus edition delivers sub-second maintenance downtime and 2x read/write performance. Built for critical apps.

    Cloud SQL Enterprise Plus gives you a 99.99% availability SLA with near-zero downtime maintenance—typically under 10 seconds. Get 2x better read/write performance, intelligent data caching, and 35 days of point-in-time recovery. Supports MySQL, PostgreSQL, and SQL Server with built-in vector search for gen AI apps. New customers get $300 in free credit.
    Try Cloud SQL Free
  • 5
    pydictor

    pydictor

    powerful and useful hacker dictionary builder for a brute-force attack

    A powerful and useful hacker dictionary builder for a brute-force attack. You can use pydictor to generate a general blast wordlist, a custom wordlist based on Web content, a social engineering wordlist, and so on; You can use the pydictor built-in tool to safe delete, merge, unique, merge and unique, count word frequency to filter the wordlist, besides, you also can specify your wordlist and use '-tool handler' to filter your wordlist. You can generate highly customized and complex...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    FoxNuke

    FoxNuke

    A Proffesional Stress-Testing(ddos) tool for pentesters

    The FoxNuke program is written in python and uses Firefox in order to complete the distributed denial of service attack feature. Multiple headers are used from the Firefox browser, along with a personal configuration option for the Opera browser. The FoxNuke Program is still underdevelopment as of 8/24/17, full release is set to come out sometime during 2017-2018. If you would like to participate in the TESTING of this program and would like to help report bugs, etc. then please email leyvarosnel@gmail.com for further inquiries. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    SpiderFoot

    SpiderFoot

    Open Source Intelligence Automation.

    SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a given target, which may be an IP address, domain name, hostname or network subnet. SpiderFoot can be used offensively, i.e. as part of a black-box penetration test to gather information about the target or defensively to identify what information your organisation is freely providing for attackers to use against you.
    Leader badge
    Downloads: 122 This Week
    Last Update:
    See Project
  • 8

    radiustest

    Radius client written in python

    ...The main idea is to have a client which could be easily used to test different Radius servers. Client supports: - Radius PAP authentication - Multi thread (sniffing separated from sending) - Several Attribute Value Pairs (AVP) supported (nas-ip-address, service-type, nas-port-type, calling-station-id, called-station-id) - We can add new AVP easily - Flooding mode (performance/stress testing) - Accounting messages Client uses scapy library to send/receive packets. It consists of two python classes: - RadiusExt: Radius class supporting AVP, authentication, packet manipulation (derived from Scapy Packet class) - RadiusAttr: Class for AVP (derived from Scapy Packet class) I use this client to: - test basic PAP authentication - send different AVP to test if Radius server is behaving correctly (RFC compliance) - display returned AVP - flood Radius server with multiple packets (performance testing) For examples please refer to readme.txt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    GoAgent

    GoAgent

    GoAgent will regularly scan the available google gae ip

    GoAgent, which is always available, will regularly scan the available google gae ip, and provide a version that can automatically obtain the ip to run. GoAgent, which has always been available, will regularly scan the available google gae ip, goagent is the source code around May 2015. You can download the googleip.txt file. It is a list of available Google ip addresses. There are about 2w ips. The source is obtained by scanning all Google address domains with my vpn. The reliability is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build AI Apps with Gemini 3 on Vertex AI Icon
    Build AI Apps with Gemini 3 on Vertex AI

    Access Google’s most capable multimodal models. Train, test, and deploy AI with 200+ foundation models on one platform.

    Vertex AI gives developers access to Gemini 3—Google’s most advanced reasoning and coding model—plus 200+ foundation models including Claude, Llama, and Gemma. Build generative AI apps with Vertex AI Studio, customize with fine-tuning, and deploy to production with enterprise-grade MLOps. New customers get $300 in free credits.
    Try Vertex AI Free
  • 10

    LBActive

    LBActive is an dynamic and active load balancer health check system

    LBActive is an dynamic and active load balancer health check system written in Python. Currently it supports only Nginx. LBActive dynamically adjusts the weight of a weighted round robin or ip hash Nginx load balancer by retrieving the current load on each backend server. The next release will move to a more modular approach to enable support for other load balancers that do not have dynamic and/or active checks and other types of backend checks if needed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    MITMf

    MITMf

    Framework for Man-In-The-Middle attacks

    MITMf aims to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques. Originally built to address the significant shortcomings of other tools (e.g Ettercap, Mallory), it's been almost completely rewritten from scratch to provide a modular and easily extendible framework that anyone can use to implement their own MITM attack. The framework contains a built-in SMB, HTTP and DNS server that can be controlled and used by the...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a toolkit written using 'bash, python, ruby' that allows you to automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Jack the Stripper

    Jack the Stripper

    Perform automated MITM (Man In The Middle) attacks.

    ENGLISH: Jack the Stripper uses iptables, Ettercap and SSLStrip to intercept data between two connected targets (IP addresses). The victims's ARP tables must be poisoned by Ettercap, that means Jack the Stripper works only on local networks. PORTUGUÊS: Jack The Stripper utiliza iptables, Ettercap e SSLStrip para interceptar dados entre dois alvos (endereços IP) interconectados. As tabelas ARP das vítimas devem ser envenenadas pelo Ettercap, isso significa que Jack The Stripper funciona...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    BACnet LAN Monitor

    Continuous BACnet/IP LAN monitoring

    This project has two parts, a daemon and a web interface. The daemon listens for BACnet/IP traffic, classifies it, and can send alerts for some types of behavior. The web interface displays summary charts for the information it finds, grouped by the layers of the BACnet/IP stack. The daemon is based on the BACpypes library, the web application is based on the bottle framework, and they communicate via redis. The web interface can take advantage of deamonlogger capture files for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    dhcpclientsimulator

    dhcpclientsimulator

    Both a DHCP client simulator and a DHCP attack tool.

    #DHCP Client Simulator For the DHCP client simulator mode, assuming there is an active DHCP server on the network, the user can choose to simulate any number of DHCP clients. All DHCP leases obtained from the server are saved in the DHCP_Leases.txt file, which is automatically generated by the program. The user can also release the leases received from the server, either one by one (by IP address) or all of them at once. After releasing all the addresses, the DHCP_Leases.txt file is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    subnetcalculator

    subnetcalculator

    Basic subnet calculator written in Python.

    Based on the IP address and subnet mask input from the user, the following values are calculated: #1. Network address #2. Broadcast address #3. Number of valid hosts #4. Wildcard mask #5. Number of mask bits (CIDR notation) #6. Random IP addresses from the subnet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ospfdiscoverysnmp

    ospfdiscoverysnmp

    OSPF network discovery script via SNMP.

    OSPF_SNMP_v1.0.py is an OSPF network discovery script. It allows the discovery of all OSPF network devices in the network, without connecting to each of them or knowing all their IP addresses. The user must provide the IP and SNMP community string of a single OSPF device in the network (for example, a device in the core) and the script searches for all other OSPF routers. Prior to running the script, the user should configure SNMPv2 community string on the device and also include the subnet between his PC and the router into the OSPF process, so he has IP connectivity to all other OSPF nodes. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    pyFreeDnsUpdate

    FreeDNS update python script

    pyFreeDnsUpdate is a command line python script that updates the FreeDNS record for a given domain to the current public facing IP address detected by the local host. It requires a one time edit to configure a list of domain|api_key pairs, and after that it can be run as a chron job to perform a sync check and update push if needed. Activity is logged on a local text file, and DEBUG level can be enabled in case of troubles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    netcfgtoolssh

    netcfgtoolssh

    Python script for pushing the same configuration on multiple devices.

    ...The script also checks if all the needed files exist, if all the IP addresses are valid and if all the devices are reachable. Tools used: Python 2.7.3, GNS3, Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    MITRE Common Layer 3

    Approach to choose MANET routing peers for existing protocols.

    Common Layer 3 presents an approach that allows an algorithm to choose IP routing peers intelligently among the nodes in a MANET but does not involve any modifications to existing IP routing protocols. In addition, our approach works as a pure interface between (any) MANET radio terminal and any IP router, so nodes using our interface interoperate with nodes that do not use this interface or with nodes using different algorithms to select routing peers. This software is a prototype of the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    netcfgtooltelnet

    netcfgtooltelnet

    Python script for pushing the same configuration on multiple devices.

    ...This feature can be further customized to prompt the user for them or read them from a file. The script also checks if all the needed files exist, if all the IP addresses are valid and if all the devices are reachable. Tools used: Python 2.7.3, GNS3, Linux.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    BlueGate HotSpot

    BlueGate HotSpot

    BlueGate HotSpot is a hotspot software

    ...Main Features: +Share any type of Internet Connection (LAN,Ethernet,3G/4G,Wifi,etc) +WPA2 AES Encryption +Extends your Router's range & Acts as a repeater +View clients connected (Device name, Ip Address, Mac Address) +Avoid Overcharges for Costly Connections +Support Windows 7/8/8.1 (Support for Windows 10 soon) +User Friendly & Light Weight +Leaves nothing behind (Virtual adapter is cleared when hotspot is stopped) +Written in Python :))
    Downloads: 8 This Week
    Last Update:
    See Project
  • 23
    simple line command tool send several trames over TCP lan in AF_INET SOCK_STREAM and return elapsed times. usage: (pytestlan) ser IP PORT usage: (pytestlan) cli IP PORT nb_of_loop data_size example server: python pytestlan.py ser localhost 50000 example server: pytestlan.pyc ser 192.168.0.37 50000 example client (windows): pytestlan.exe cli 192.168.0.12 50000 1000 100 tested on linux, WinXP, Win7 Seven, 2008 Server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 25
    VozBox. Más que una centralita.

    VozBox. Más que una centralita.

    VozBox. Asterisk VoIP PBX.

    VozBox es poder disponer de un Sistema de Comunicación Avanzado. Es poder llegar más lejos. Es poder convertir lo más sofisticado en lo más sencillo. Es poder contar con la más avanzada tecnología de comunicación, reduciendo sus gastos. Es una centralita VoIP Asterisk con altas prestaciones para las Empresas. Última versión disponible 2.11.19 en la web de VozBox: http://www.vozbox.es/descarga/ Internet connection required during installation. Update version: 2.11.19 1 -...
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB