RoseSecurity / Automator-TerminatorLinks
A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address.
☆31Updated 3 years ago
Alternatives and similar repositories for Automator-Terminator
Users that are interested in Automator-Terminator are comparing it to the libraries listed below
Sorting:
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆49Updated last month
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆54Updated 5 months ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Resource Dump For Learning Cybersec-related Concepts☆24Updated 4 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Industrial Hacking Simulator☆27Updated last month
- Forensic Imaging quickstarts!☆14Updated 2 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- A simple script to try and decode a string in various encoding mechanisms regardless of its (original) type.☆25Updated 4 years ago
- Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"☆23Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- ☆30Updated 4 years ago
- ☆19Updated 3 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- ☆28Updated 3 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago