RoseSecurity / Automator-TerminatorLinks
A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address.
☆33Updated 3 years ago
Alternatives and similar repositories for Automator-Terminator
Users that are interested in Automator-Terminator are comparing it to the libraries listed below
Sorting:
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆44Updated 2 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆49Updated 6 months ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 4 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated 6 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28Updated last year
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- ☆12Updated 3 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆11Updated 8 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- A Darktrace CLI written in Python☆16Updated 6 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 5 years ago
- Resource Dump For Learning Cybersec-related Concepts☆25Updated 5 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 5 years ago
- ☆22Updated 9 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 5 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- ☆37Updated 4 years ago