RoseSecurity / Automator-TerminatorLinks
A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address.
☆31Updated 3 years ago
Alternatives and similar repositories for Automator-Terminator
Users that are interested in Automator-Terminator are comparing it to the libraries listed below
Sorting:
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆58Updated 2 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 4 months ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- Industrial Hacking Simulator☆27Updated last month
- Hashes of infamous malware☆26Updated 2 years ago
- Resource Dump For Learning Cybersec-related Concepts☆25Updated 5 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- A memorial site for Hackers and Infosec people who have passed☆138Updated last week
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 5 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- ☆22Updated 9 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- ☆33Updated 8 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 3 years ago
- ☆53Updated 4 years ago
- THP Forensic Challenges☆23Updated 2 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 6 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year