RoseSecurity / WindowsKillerLinks
Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, …
☆103Updated last year
Alternatives and similar repositories for WindowsKiller
Users that are interested in WindowsKiller are comparing it to the libraries listed below
Sorting:
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆80Updated 2 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆116Updated 2 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆245Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- Automated rogue access point setup tool.☆198Updated 4 years ago
- A WLAN red team framework.☆156Updated last year
- Fork from @rsmudge/armitage☆136Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆62Updated 2 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆194Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 3 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆288Updated 4 years ago
- Full Valid Fake Data Generator☆101Updated last year
- An Encrypted File transfer via AES-256-CBC☆52Updated 4 years ago
- Automated capturing of WPA & WPA2 password Hashes.☆160Updated 2 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆21Updated 6 years ago
- Log keystrokes, take screenshots and grab system information from a target host and exfiltrate to Discord and Google Forms.☆21Updated 2 years ago
- ☆123Updated last year
- Collection of extra pentest tools for Kali Linux☆109Updated 3 weeks ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆120Updated 3 years ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆83Updated 5 years ago
- Windows Hacking FrameWork using Reverse Shell☆105Updated 6 months ago
- ☆44Updated last year
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆70Updated 8 months ago