GIVE LIKE ,DON'T LEECH , I WILL REPORT LEECHERS
DDoS: UDP,TCP,HTTP,Torshammer attack,R.U.D.Y attack,Apache killer attack,DNS amplification attack,Bypass "Under attack mode" provided by CloudFlare,Bypass "Under attack mode" provided by CloudFlare and Rate-LimitingWordPress testing.
Proxies collecting: Mass HTTP proxies gathering,Mass SOCKS5 proxies gathering,Checking proxy.
IoTs mass scanning: MASS SSH,TELNET,FTP,SMTP,MYSQL SCANNING,Mass Android Debug Bridge (ADB) exploit.
Bruteforcing: Admin panel on web page,FTP server,SSH SERVER, TELNET SERVER,WORDPRESS LOGIN PAGE , Admin panel finder.GOOGLE DORKING, WEBCAM FINDER ETC
This python library is made for educationnal purposes only. The creator and developper, not responsible for any misuse for this module in any malicious activity. it is made as a tool to understand how hackers can create their tools and performe their attacks. it contains most of known attacks and exploits.
DDoS: UDP,TCP,HTTP,Torshammer attack,R.U.D.Y attack,Apache killer attack,DNS amplification attack,Bypass "Under attack mode" provided by CloudFlare,Bypass "Under attack mode" provided by CloudFlare and Rate-LimitingWordPress testing.
Proxies collecting: Mass HTTP proxies gathering,Mass SOCKS5 proxies gathering,Checking proxy.
IoTs mass scanning: MASS SSH,TELNET,FTP,SMTP,MYSQL SCANNING,Mass Android Debug Bridge (ADB) exploit.
Bruteforcing: Admin panel on web page,FTP server,SSH SERVER, TELNET SERVER,WORDPRESS LOGIN PAGE , Admin panel finder.GOOGLE DORKING, WEBCAM FINDER ETC
This python library is made for educationnal purposes only. The creator and developper, not responsible for any misuse for this module in any malicious activity. it is made as a tool to understand how hackers can create their tools and performe their attacks. it contains most of known attacks and exploits.