Linux game server UDP flood analyzer and protector
ServerArk is a application for Linux gaming servers that samples and analyzes incoming UDP packets at the kernel level in real time to determine if any packets are part of a UDP flood attack. Flood attacks on gaming servers are typically designed to make the players on the server lag to the point where the game is not playable. It can even crash some game servers.
ServerArk automatically detects when a UDP flood attack occurs and uses kernel-level iptables rules to dynamically block those packets from being processed by the game server at all. ...
Gui for aircrack-ng that can crack WEP and WPA networks, automatically scans for available networks, provides fake authentication and injection support.
Death Star is a 'multi-protocol stress testing' tool. Initially forked from LOIQ v0.3a, Death Star seeks to surpass LOIC and LOIQ in terms of performance, OS support and win.
Application proxy toolkit which inherits the ideology of TIS fwtk and maintains API backwards compatibility. The design goal is to make it simple yet powerful; no performance hacks allowed in the code and library dependencies are reduced to minimum.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant.
*** Hyenae is back ***
Hyenae will be continued here: https://sourceforge.net/p/hyenae-ng
The DDoS Attack Defender Tool is a simple, yet effective python script that defends your linux system against a distributed denial of service (DDoS) attack by limiting the number of connections per IP Address.
inundator is a tool used to anonymously inundate intrusion detection logs with false positives to obfuscate a real attack, leaving the IDS analyst feeling completely inundated.
pwntooth is designed to automate Bluetooth Pen-Testing. It scans for devices, then runs the tools specified in the pwntooth.conf; included blueper, bluesnarfer, Bluetooth Stack Smasher (BSS), carwhisperer, psm_scan, rfcomm_scan, and vcardblaster.
Orange JeOS ("juice") is a small and secure Linux distribution
Orange JeOS ("juice") is a small and secure Linux distribution, based on CentOS and designed for use by hardware, software and virtual appliance builders.
OJ-Builder Tools are used to build an Orange JeOS ISO entirely from public CentOS repository.
Orange JeOS leverages the CentOS Linux distribution and allows building fully functioning software (and hardware and virtual) appliances in as little as 200 MB.
BRUTALIS - BRUTeforce ALternative Is Stupid. Brutalis generate brute force passwords. It can be integrated in any command line for an attack and support resume, character panel, minimum and maximum length, special separating characters and more.
ddaddos stands for ``detect DAD (Duplicate Address Detection) Denial of Service'', it's a deamon that sends periodically special IPv6 packets in order to spot a network under a DAD based attack.
Gardol monitors system log files to detect denial of service and other attacks and blocks attacking sites with Linux iptables. Attack detection rules may be programmed in Perl.
Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys
based on a active dictionary attack, key generator, distributed
network attack and some other methods, it's based on wepattack and GPL licensed
...Knock sequences are defined through XML files; users specify: number of packets of each knock sequence, payload and header of each packet. Logging capability. Generation of smoke packets.No replay-attack
syndetector is a software which can detect and drop packet when a synflood attack is detected ! Based on a simple detection system (by the use of iptables and libipq) and on a simple use It is realy easy to setup this software.
Script to automatically update /etc/hosts.deny due to use of an illegal username or excessive bad passwords. Written to prevent the success of a brute force attack.
Track Attack is a system for analysing data contained in log
files. Track Attack can process different types of log files in
parallel so as to get a time-ordered view of how events unfolded.
EtherMan: Ethernet Man In The Middle Attack Tool. It is capable of forcing traffic between two hosts to pass by a third party (MITM) and then redirected to its original destination again.
This program is written for educational reasons, and I am not res
myNetWatchman Perl Agent is a program that is designed to capture rejected packet information from various firewall logs and forward this attack information to central analysis servers at myNetWatchman.com.
A "Theoretically Secure Operating System", focused on information protection, that is provably secure provided that a specific part of the kernel would be free of bugs.
In particular, bugs in application can't be exploited to attack the system.
...It allows for easy definitions of events and alerts and is highly flexible. Its uses range from internet accounting using squid logs to sending instant messages when your system is under attack.
The Master-Slave project is directly related to the Snort IDS to dynamically create rules into iptables firewall. It could send the attacker IP address to others machines into the circuit that will block the IP address before any attack from the intruder