RoseSecurity / WindowsKiller
Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, …
☆103Updated last year
Alternatives and similar repositories for WindowsKiller:
Users that are interested in WindowsKiller are comparing it to the libraries listed below
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆193Updated 3 years ago
- Gather information from an email address connected to Office 365☆85Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆106Updated 2 years ago
- A CLI-tool used to stream CCTV online footage based on URL params☆64Updated 3 years ago
- A WLAN red team framework.☆150Updated 5 months ago
- Automated rogue access point setup tool.☆194Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 2 months ago
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆708Updated 2 months ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆31Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Modular personalized dictionary generator.☆203Updated 7 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 8 months ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆184Updated last year
- A targeted DNS cache poisoner☆117Updated 2 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆162Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆115Updated 5 months ago
- Uncover the full name of a target on Linkedin.☆161Updated 2 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆210Updated last year
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated last year
- Open-Source Intelligence Apparatus☆164Updated 11 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 8 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 8 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆106Updated last year
- ☆132Updated 2 years ago