RoseSecurity / Automator-Terminator
A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address.
☆31Updated 3 years ago
Alternatives and similar repositories for Automator-Terminator:
Users that are interested in Automator-Terminator are comparing it to the libraries listed below
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 2 months ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Industrial Hacking Simulator☆26Updated 2 months ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆51Updated 2 months ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated last year
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆15Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- Hashes of infamous malware☆26Updated last year
- Scripts related to offensiveosint.io☆21Updated 4 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- recon-ng modules for Censys☆37Updated last year
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated 2 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 9 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- Operational Technology Cyber Attack Database☆47Updated 2 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated last year
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆14Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 9 months ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Presentation Slides and Resources☆15Updated 9 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- ☆50Updated 4 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆13Updated 7 years ago