autoRST is an automated TCP RST exploit. It uses the Winpcap libraries to sniff for TCP packets on a network and then sends out a forged RST packet after calculating the appropriate sequence number and forging the MAC address. Makes use of the recent vulnerable released by Paul A. Watson.
42cb6ede12e9199900a5e6282342a4505e4a0df06f3b97e39afc1e2143e7b326
Full whitepaper by Paul (Tony) Watson entitled Slipping in the Window: TCP Reset Attacks.
cfaa0ce13321f28319146cd6d78716b3070bbd92fc6e664a8864fa197b70c817