RoseSecurity / WindowsKiller
Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, …
☆103Updated last year
Related projects ⓘ
Alternatives and complementary repositories for WindowsKiller
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆192Updated 2 years ago
- Gather information from an email address connected to Office 365☆83Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆75Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆96Updated last year
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆72Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆105Updated last year
- Automated rogue access point setup tool.☆192Updated 3 years ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆56Updated last year
- Traps web spiders☆63Updated 4 years ago
- A WLAN red team framework.☆141Updated last month
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆694Updated 2 months ago
- The swiss army knife for cybersecurity enthusiasts. All needed scripts and tools integrated into one portable and customizable CLI.☆41Updated 6 months ago
- Meterpreter Reverse shell over TOR network using hidden services☆89Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆117Updated 4 months ago
- Malware vulnerability intel tool for third-party attackers☆113Updated 2 weeks ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆88Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆93Updated last year
- Modular personalized dictionary generator.☆189Updated 2 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆102Updated 9 months ago
- A basic flask based Outlook Web Honey pot☆65Updated last year
- Xfinity / Comcast Wordlist Generator☆45Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆137Updated 3 years ago
- An Encrypted File transfer via AES-256-CBC☆44Updated 3 years ago
- ☆132Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆198Updated 3 weeks ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆53Updated last year