| Tools | 
Description | 
| DHCPig | 
IIt creates an advanced DHCP exhaustion attack. DHCPig consumes all IPs on the LAN, which resists users from obtaining IPs. | 
| FunkLoad | 
IIt is a functional and load web tester that launches a TCPWatch proxy and record activities over the network. | 
| iaxflood | 
IIt is a VOIP flooder tool. | 
| Inundator | 
IIt is an anonymous intrusion detection false positives generator with support for multiple targets.  | 
| Inviteflood | 
IIt is a SIP/SDP INVITE message flooding over UDP/IP. | 
| ipv6-toolkit | 
IIt is a security assessment tool for the IPv6 flow label field. | 
| mdk3 | 
IMdk3 is a wireless attack tool for IEEE 802.11 networks. | 
| Reaver | 
IIt implements a brute-force attack against Wifi Protected Setup registrar PINs in order to recover WPA/WPA2 passphrases. | 
| Rtpflood | 
IA command-line tool used to flood any device that is processing RTP. | 
| SlowHTTPTest | 
IThis tool is used to test slow HTTP DoS vulnerabilities. | 
| t50 | 
IIt is a Multi-Protocol packet injector tool | 
| Termineter | 
IIt is a python smart meter Testing Framework that implements the C12.18 and C12.19 protocols for communication. | 
| THC-IPV6 | 
IIt is a complete toolset to attack the inherent protocol weaknesses of IPv6 and ICMP6. | 
| THC-SSL-DOS | 
IIt is a stress tester for the SSL handshake. | 
| Powersploit | 
IIt is a collection of Microsoft PowerShell modules that can be used to aid penetration tester during all phases of an assessment. | 
| WeBaCoo | 
It is a web backdoor script-kit, aiming to provide a stealth terminal-like connection over HTTP between client and web server. It is designed to operate under the radar of modern up-to-dated AV, NIDS, IPS, Network Firewalls and Application Firewalls, proving a stealth mechanism to execute system commands to the compromised server. |