RoseSecurity / Automator-TerminatorLinks
A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address.
☆33Updated 3 years ago
Alternatives and similar repositories for Automator-Terminator
Users that are interested in Automator-Terminator are comparing it to the libraries listed below
Sorting:
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆49Updated 7 months ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆46Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- Integrated web scraper and email account data breach comparison tool☆77Updated last year
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- ☆22Updated 9 years ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 4 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆77Updated last year
- Shell and Pen-testing Tool☆17Updated 8 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Papers, presentations and documents from the team at Hacker House.☆52Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- ☆53Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- ☆10Updated 5 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago
- Resource Dump For Learning Cybersec-related Concepts☆25Updated 5 years ago
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆35Updated 8 years ago