RoseSecurity / WindowsKillerLinks
Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, …
☆104Updated last year
Alternatives and similar repositories for WindowsKiller
Users that are interested in WindowsKiller are comparing it to the libraries listed below
Sorting:
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 4 months ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆217Updated last year
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆79Updated 2 years ago
- A CLI-tool used to stream CCTV online footage based on URL params☆63Updated 3 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆107Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆109Updated 2 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆235Updated 9 months ago
- Xfinity / Comcast Wordlist Generator☆63Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Automated rogue access point setup tool.☆196Updated 4 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆225Updated 7 months ago
- Collection of extra pentest tools for Kali Linux☆105Updated 2 years ago
- ☆157Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 10 months ago
- ☆43Updated 10 months ago
- A targeted DNS cache poisoner☆120Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆109Updated last year
- An OSINT Framework project based on Python☆106Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆69Updated this week
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆59Updated 2 years ago
- A WLAN red team framework.☆155Updated 8 months ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆66Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆103Updated last year
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago