EndGame
multitor
Our great sponsors
EndGame | multitor | |
---|---|---|
3 | 1 | |
212 | 996 | |
- | - | |
0.0 | 0.0 | |
over 2 years ago | 9 months ago | |
Lua | Shell | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
EndGame
-
How common are flood attacks on tor websites?
You could use OnionBalance to load balance your onion service, you can also look at https://github.com/onionltd/EndGame to see the most advanced filter onion service use to protect against DDoS attacks.
- Can somebody please explain how to solve the Clock-styled captcha?
- Suggestions for DDoS shielding and load-balancing for a high-volume onion service?
multitor
-
dorkscout - automated google dorking scan tool
unfortunately golang doesn't work with proxychains :( but you can still use other tools such as graftcp or specify a proxy with the -x or --proxy flag that uses multiple proxy's like multitor or just use the tor proxy which is the simplest way.
What are some alternatives?
Nginx-Lua-Anti-DDoS - A Anti-DDoS script to protect Nginx web servers using Lua with a HTML Javascript based authentication puzzle inspired by Cloudflare I am under attack mode an Anti-DDoS authentication page protect yourself from every attack type All Layer 7 Attacks Mitigating Historic Attacks DoS DoS Implications DDoS All Brute Force Attacks Zero day exploits Social Engineering Rainbow Tables Password Cracking Tools Password Lists Dictionary Attacks Time Delay Any Hosting Provider Any CMS or Custom Website Unlimited Attempt Frequency Search Attacks HTTP Basic Authentication HTTP Digest Authentication HTML Form Based Authentication Mask Attacks Rule-Based Search Attacks Combinator Attacks Botnet Attacks Unauthorized IPs IP Whitelisting Bruter THC Hydra John the Ripper Brutus Ophcrack unauthorized logins Injection Broken Authentication and Session Management Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Security Misconfiguration Cross-Site Scripting (XSS) Insecure Deserializati
kalitorify - Transparent proxy through Tor for Kali Linux OS