RoseSecurity / WindowsKillerLinks
Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, …
☆105Updated last year
Alternatives and similar repositories for WindowsKiller
Users that are interested in WindowsKiller are comparing it to the libraries listed below
Sorting:
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆108Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆113Updated 2 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆79Updated 2 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆89Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShell☆53Updated 2 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆239Updated 11 months ago
- Fork from @rsmudge/armitage☆133Updated 2 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆117Updated 4 months ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆44Updated last year
- Automated rogue access point setup tool.☆197Updated 4 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆285Updated 4 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆60Updated 2 years ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆68Updated 3 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆120Updated 3 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆75Updated 3 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆56Updated 2 years ago
- ☆44Updated last year
- Open-Source Intelligence Apparatus☆164Updated last year
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆238Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- Xfinity / Comcast Wordlist Generator☆64Updated 2 years ago
- A targeted DNS cache poisoner☆121Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆118Updated last year