RoseSecurity / WindowsKiller
Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, …
☆104Updated last year
Alternatives and similar repositories for WindowsKiller:
Users that are interested in WindowsKiller are comparing it to the libraries listed below
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆195Updated 3 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated 2 years ago
- A WLAN red team framework.☆152Updated 6 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆713Updated 3 months ago
- Automated rogue access point setup tool.☆195Updated 4 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆106Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- A CLI-tool used to stream CCTV online footage based on URL params☆64Updated 3 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆109Updated last year
- A basic flask based Outlook Web Honey pot☆65Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆222Updated 6 months ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆295Updated 3 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆285Updated 4 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆31Updated 3 years ago
- Xfinity / Comcast Wordlist Generator☆61Updated 2 years ago
- Traps web spiders☆71Updated 4 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆37Updated 6 months ago
- Red Team PowerShell Script☆334Updated last year
- Your go-to resource for all things OSINT☆167Updated last year
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆104Updated last year
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆59Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆108Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 10 months ago
- ☆43Updated 9 months ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆141Updated last month