RoseSecurity / Automator-Terminator
A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address.
☆31Updated 3 years ago
Alternatives and similar repositories for Automator-Terminator:
Users that are interested in Automator-Terminator are comparing it to the libraries listed below
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 2 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 3 weeks ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆50Updated this week
- Hashes of infamous malware☆25Updated last year
- ☆37Updated 3 years ago
- Ansible playbooks for the Seclab project☆12Updated 2 years ago
- ☆38Updated last year
- ☆12Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Use md5-collisions to make evil executables looking like a good one.☆28Updated 4 years ago
- Windows Forensics Salt States☆19Updated this week
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆53Updated 3 years ago
- Penguin OS Forensic (or Flight) Recorder☆38Updated last month
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- DC540 hacking challenge 0x00005b.☆16Updated last year
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- ☆27Updated 3 weeks ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated last year
- An uploader honeypot designed to look like poor website security.☆27Updated last month
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Create Password lists for cracking lyrical passwords☆14Updated 8 months ago
- A database for storing, querying and doing stats on credential leaks☆39Updated last year
- ☆11Updated 4 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month