RoseSecurity / WindowsKiller
Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, …
☆104Updated last year
Alternatives and similar repositories for WindowsKiller
Users that are interested in WindowsKiller are comparing it to the libraries listed below
Sorting:
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated 2 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆713Updated 3 months ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A CLI-tool used to stream CCTV online footage based on URL params☆63Updated 3 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆214Updated last year
- Learn how to set up a fake authentication web page on a fake WiFi network.☆109Updated 2 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆232Updated 9 months ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated last week
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆177Updated 9 months ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆107Updated 2 years ago
- Automated rogue access point setup tool.☆196Updated 4 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆31Updated 3 years ago
- IoT Camera Reconnaissance and Live Viewer☆145Updated 9 months ago
- A WLAN red team framework.☆153Updated 7 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆110Updated last year
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆165Updated 3 years ago
- ☆142Updated last year
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 4 months ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆42Updated last year
- msImpersonate - User account impersonation written in pure Python3☆107Updated 3 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆133Updated last year
- ☆122Updated last year
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 10 months ago
- Turn PuTTY into an SSH login bruteforcing tool.☆284Updated 4 years ago