RoseSecurity / Automator-Terminator
A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environments. Utilizing multithreaded processing, Automator-Terminator delivers a powerful wave of spoofed ethernet packets to a null MAC address.
☆31Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Automator-Terminator
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated last year
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated last year
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆47Updated 10 months ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆48Updated 2 weeks ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆75Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 2 years ago
- Ansible playbooks for the Seclab project☆12Updated 2 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21Updated last year
- Miscellaneous tools for BloodHound☆18Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆13Updated 2 years ago
- Hashes of infamous malware☆25Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 3 months ago
- Forensic Imaging quickstarts!☆13Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 2 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆19Updated last year
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 6 months ago
- Industrial Hacking Simulator☆25Updated last week
- Ransomware for demonstration☆14Updated last year
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"☆21Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Updated 2 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago