Welcome To Defective By Design!

What Can I Do Here?

Here, you can access all my projects, mainly PenTesting tools with some other content mixed in. I also Include Manuals and infomation with these projects. Disclaimer: These Tools are developed entirely for fun and may be ineffective for actual pentesting

Foreword

Before you use these tools remember that they may not be the most secure. Additionally, Some of these tools in the wrong hands, are capable of causing chaos on networks. I want you to remember that this is illegal and I do not condone these actions. ¬Clicked 27/04/25

Download Links!

SlowLoris DDos

SlowLoris is a very powerful DDos proggram that can take down some websites with one host. It was designed to overwhelm a single computer, web server or database by opening many simultaneous TCP connections.

Downloads slowloris.py

Are You Dead Yet DDos

R.U.D.Y short for R-U-Dead-Yet is a DDos Tool used to execute slow rate attacks that gradually overwhelm web servers. RUDY implements a type of attack known as a low and slow DDos. the goal is to open a relatively small number of connections to the target and keep them open as long as possible. this consumes all available resources on the server causing it to crash.

Download RUDY DDos

SMB Bruteforce

An SMB Bruteforce Attack attempts to gain access to an SMB server by attempting every password the attacker specifes in a list called a dictonary. If the password is in the list access will be granted to the SMB server. This particular one, made by me, requires the user to provide their own wordlist.

Download SMB Bruteforce

MD5 Hash Decrypter

When passwords are entered into a website, they are hashed, checked against a database and if the entered password and database match, the user is granted access to the account. The hashing process is put in place so if the password is intercepted on the way to the server (often in a man in the middle attack) they are unreadable. However, when a company experiences a data leak, thousands of hashed passwords are exposed. this shouldnt be a problem as they are supposedly unreadable but with basic python scripts they can be decrypted, giving the attacker the password.

Download Hash Cracker

2025, Anonymous