Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, …
☆105Nov 6, 2023Updated 2 years ago
Alternatives and similar repositories for WindowsKiller
Users that are interested in WindowsKiller are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Nov 14, 2022Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆48Mar 8, 2023Updated 3 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Dec 2, 2021Updated 4 years ago
- /dev/tty☆29Mar 31, 2026Updated last week
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,857Mar 23, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Aug 17, 2018Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Simple PowerShell script to quickly add Windows Firewall Rules☆18Sep 14, 2017Updated 8 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- scripts to setup pentesting system and use during pentest☆21Jun 1, 2022Updated 3 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆35Feb 9, 2025Updated last year
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- 🐝 Zigbee security research toolkit for the RaspBee, nRF52840 and CC2531 radio modules.☆34Feb 8, 2020Updated 6 years ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆223May 2, 2025Updated 11 months ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Integrated web scraper and email account data breach comparison tool☆77Jul 22, 2024Updated last year
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 4 years ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆18Aug 2, 2023Updated 2 years ago
- Unified repository for different Metasploit Framework payloads☆22Oct 25, 2017Updated 8 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆13Nov 28, 2018Updated 7 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- Dockerfiles for php with a few extensions already loaded☆10Jun 17, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Scripts related to offensiveosint.io☆23Jun 5, 2020Updated 5 years ago
- Decompile android apps with a single command☆23Dec 26, 2018Updated 7 years ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆182Apr 5, 2024Updated 2 years ago