Showing 619 open source projects for "cc-attack"

View related business solutions
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
     Abdal SSH BruteForce

    Abdal SSH BruteForce

    powerful SSH BruteForce tool

    Abdal SSH BruteForce tool is a powerful software with zero error rate to test the intrusion of servers that work with ssh protocol, this tool supports proxy for attacks and can transfer all your traffic in the hacking process to the proxy Slowly
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2

    HashApp

    python software for cracking and creating SHA and MD5 hashes

    A python software that can be used for encrypting text in SHA384, SHA512, SHA224, SHA1, SHA256 and MD5; or for cracking six different types of hashes, namely SHA384, SHA512, SHA224, SHA1, SHA256 and MD5 through a dictionary attack using an online txt file. You need to have python 3 or above installed to run this progam. If you would like to change the online dictionary URL for hash decryption, use CTRL+F in your text editor and search for this line: LIST_OF_WORDS = str(urlopen('https...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    scraper-helper

    A HTTP proxy that logs everything flowing through it

    A HTTP proxy that writes everything passing through it to a log file and saves the decoded bodies of HTTP requests and responses to individual files. It works with HTTPS, which means it performs a man in the middle attack SSL do it can decode all encrypted connections as well. It can create the X509 CA certificate needed to perform the MITM attack. All available documentation can be read online at http://scraper-helper.sourceforge.net/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Tamper Dev

    Tamper Dev

    Extension that allows you to intercept and edit HTTP/HTTPS requests

    If you are a developer, you can use Tamper Dev to debug your websites, or if you are a pentester, you can use it to search for security vulnerabilities by inspecting the HTTP traffic from your browser. Unlike most other extensions, Tamper Dev allows you to intercept, inspect and modify the requests before they are sent to the server. This extension provides functionality similar to Burp Proxy, MITM Proxy, OWASP ZAP, Tamper Data, and Postman Proxy, but without the need of additional software,...
    Downloads: 8 This Week
    Last Update:
    See Project
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
    Learn More
  • 5
    Sudomy

    Sudomy

    Sudomy is a subdomain enumeration tool to collect subdomains

    ... method. Sudomy utilize Gobuster tools because of its highspeed performance in carrying out DNS Subdomain Bruteforce attack (wildcard support). The wordlist that is used comes from combined SecList (Discover/DNS) lists which contains around 3 million entries. By evaluating and selecting the good third-party sites/resources, the enumeration process can be optimized. More results will be obtained with less time required.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    DISCLAIMER: USE ON YOUR OWN RISK. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER OR CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES !!! ONLY FOR PENTESTING PURPOSES !!!
    Downloads: 11 This Week
    Last Update:
    See Project
  • 7
    Stephino RPG

    Stephino RPG

    The first-ever RPG for WordPress

    ... in order to uncover the history of your species. You can form cities, attack and spy on other players and robots, send resources between cities, complete research activities and use premium modifiers to boost your gameplay. Create your own platformer mini-games and play games created by others to earn rewards. Unlock the game to create your own designs and themes and re-define the rules of the game.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Macbuntu BIGSur 2021

    Macbuntu BIGSur 2021

    Macbuntu BIGSur 2021.6 x64 bit Kernel 5.11.18 on xubuntu lts 21.04

    ... screens have been changed using plymouth macosx files. Neofetch distro name changed to Macbuntu, Apple logo fixed default Old kernel files and remnants were cleaned, new modified kernel was applied up-to-date and fast attack MacOS BigSUR Icon and Theme packages Shell plugins are integrated into the pure state of the system. Xubuntu 21.04 LTS is a long-term support distribution. Continuous security updates and support works that take a long time until 2023 are preferred in this context.
    Leader badge
    Downloads: 44 This Week
    Last Update:
    See Project
  • 9
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    ... OpenJDK 16 (Not Oracle's J2RE 1.8) to run. Install, for example, AdoptOpenJDK for Windows. NOTE: By using encryption twice the implementation is (in theory) vulnerable to Meet-In-The-Middle attack reducing key size to 256bit but the attack still requires 2^256 bytes of memory making it impossible in practice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Shift, the browser that merges all of your web apps into one powerful window. Icon
    Shift, the browser that merges all of your web apps into one powerful window.

    Your power browser.

    Streamline everything you do online when you install Shift and access thousands of apps without leaving your browser. Connect all of your Gmail, Outlook, and Office 365 accounts and manage everything from one centralized window. Build out your Shift browser with apps that integrate seamlessly so you have ultra-fast access to all the tools you use to stream, shop, work, browse, and stay connected. Shift brings it all together.
    Try for Free
  • 10
    The Lounge

    The Lounge

    The website for The Lounge

    The Lounge is a web IRC client. This website is built using Jekyll. Push notifications, link previews, file uploads, and more bring IRC to the 21st century. Remain connected to IRC servers while you are offline. Forget about bouncers. Resume where you left off on any device. The client works smoothly on every desktop, smartphone, and tablet. The Lounge is open source and licensed under the MIT license. It doesn't matter what OS you use. The Lounge just works wherever Node.js runs. Supports...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Zynix-Fusion

    Zynix-Fusion

    zynix-Fusion is a framework for hacking

    zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 12
    Google2SRT

    Google2SRT

    Download, save and convert multiple subtitles from YouTube videos

    Google2SRT allows you to download, save and convert multiple subtitles and translations from YouTube and Google Video to SubRip (.srt) format, which is recognized by most video players. You can download XML subtitles or simply type video's URL, Google2SRT will do the rest.
    Leader badge
    Downloads: 82 This Week
    Last Update:
    See Project
  • 13

    QVASIMODO's String Tools

    This project is a quick way of applying macros to a portion of text.

    ... sequentially, in the order they are listed. So, each command will operate on the result of the previous command. You can easily copy, paste, load and save both the source and the result texts. This program is written in Lazarus (FreePascal). The only non-standard library used is Zeos, but the program can be easily adapted to use Lazarus' native database components. This is free software, distributed under a CC BY-SA 4.0 Attribution-ShareAlike 4.0 International License.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    c

    c

    Compile and execute C "scripts" in one go!

    I love C for its raw speed (although it does have its drawbacks). We should all write more C. With this shell script, you can compile and execute C "scripts" in one go! (Oh yeah, and it works for C++ too.) First of all, I want to clarify why this is not the same as tcc -run. TCC is a compiler. We all know that. TCC will perform its own set of optimizations, just as GCC will perform its own and Clang will perform its own. The purpose of this script is to give a simple front-end to your...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    Password Generator

    Password Generator

    Using our program, you can create a strong password with ease.

    Using our program, you can create a strong password with ease. One of the best features of this program is that it enables you to save any password that you create in a file with the time and date . Here are some tips . To prevent your passwords from being hacked by social engineering, brute force or dictionary attack method, and keep your online accounts safe, you should notice that:1. Do not use the same password, security question and answer for multiple important accounts.2. Use a password...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    flightspace_chung
    flightspace chung is a free open source 3D space game flight simulator written in freebasic and openGL . Explore the solar system with real planets data , go to space stations, enter planets orbit with gravitation effect , fly in formation and give orders to your wingmen or declare war to combat spaceships or attack ground targets .Can run on a small netbook . moving idle and background .
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    ZeroDdos
    Welcome. Thank you for downloading this program. Thank's For Using App Zero Thanks To : Mr.SL3ND3RM4N - For Support Me DDOS-Zero-ddos
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    Secure File Vault

    Secure File Vault

    A very secure file vault for private files to avoid hackers

    A File vault to store all of your personal items, this file vault could not be brute forced (impossible because of the hashing algorithms). It uses a combination of veracrypt, winrar, 7zip to encrypt your files to ensure that they are secure and not be seen by someone. Once you start to create the file vault, your password gets hashed a million times (only takes 3 seconds) then base 64 3 times and hashed 1 more time, it uses a combination of SHA256, SHA512 and lot of other secret...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This is generated with gbdk
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Hyenae NG

    Hyenae NG

    Advanced Network Packet Generator

    Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms. *** Please check out the latest source from my GitHub repository and check the Build informations. https://github.com/r-richter/hyenae-ng/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Glarolykoi

    Glarolykoi

    Creative Commons Art (CC-BY)

    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ncdos
    NCDoS - Adalah Tool Yang Di Buat Sedemikan Rupa Untuk Menjalankan DoS Dan DDoS Attack Untuk Mendapatkan Hasil Yang Terbaik.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    DDOSER

    DDOSER

    Machine that can DDOS servers

    This machine can DDOS any IP. Takes from 2 - 5 Hours to working properly. Good luck! ====SUBMIT ERRORS HERE==== https://forms.gle/9ubmBmhivBBYGgmg7 ========================== [1 April 2020 Patch] The "This program was made with an unlicensed compiler (...)" error will be repaired today! Stay tuned. Thanks to _FoZa_ for reporting me that error! Congrats! LOG 1: That won`t fixed anything so i needed to make another version LOG 2: Fixed :) That made my program which...
    Downloads: 70 This Week
    Last Update:
    See Project
  • 24
    SSH MITM

    SSH MITM

    SSH man-in-the-middle tool

    This penetration testing tool allows an auditor to intercept SSH connections. A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the victim's SSH client will complain that the server's key has changed. But because 99.99999% of the time this is caused by a legitimate action (OS re-install, configuration change, etc), many/most users will disregard...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25

    InstaDowner

    A Denial Of Service Tool

    This is a tool used for Denial Of Service and should only be used with permission or is to be used for testing. We have all of the following methods on our tool- UDP TCP LDAP OVH NFO VPN SSYN HOME DNS HTTP HTTPS BYPASS we also offer an attack time of up to 7200 seconds
    Downloads: 3 This Week
    Last Update:
    See Project