A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address.
☆33Jan 23, 2022Updated 4 years ago
Alternatives and similar repositories for Automator-Terminator
Users that are interested in Automator-Terminator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Nov 14, 2022Updated 3 years ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Nov 6, 2023Updated 2 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆48Mar 8, 2023Updated 3 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Dec 2, 2021Updated 4 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- /dev/tty☆29Mar 31, 2026Updated last week
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- MQTT exploit and Pentesting guide for penetration tester☆27Nov 24, 2023Updated 2 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Jan 6, 2019Updated 7 years ago
- A simple script to test your knowledge on well known ports☆10Aug 13, 2017Updated 8 years ago
- Decommissioned: GOV.UK's Capistrano-based application deployment code. Replaced by alphagov/govuk-helm-charts.☆13Aug 24, 2023Updated 2 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple error lookup for Win32 and NTSTATUS errors☆20Nov 25, 2018Updated 7 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- ☆40May 29, 2015Updated 10 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆17Sep 13, 2024Updated last year
- Evaluating and reproducing real-world robot manipulation policies (e.g., RT-1, RT-1-X, Octo) in simulation under common setups (e.g., Goo…☆11Dec 30, 2024Updated last year
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Train and evaluate an Action Chunking Transformer (ACT) to perform cooperative robot manipulation tasks☆17May 30, 2024Updated last year
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Firmware that transforms ESP32 to a remote I/O device with Modbus-TCP + configuration interface☆13Jul 23, 2023Updated 2 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Data pipeline to extract and preprocess BigQuery user journey data.☆13Jun 16, 2022Updated 3 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago