3val / AthenaLinks
Athena Botnet Source Code
☆153Updated 9 years ago
Alternatives and similar repositories for Athena
Users that are interested in Athena are comparing it to the libraries listed below
Sorting:
- Dangerous Malwares☆210Updated 8 years ago
- Exploitkit☆186Updated 8 years ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆173Updated 8 years ago
- Bug7sec Team - ransomware open source (web)☆132Updated 8 years ago
- A proof of concept P2P botnet written in Python using the Twisted framework☆48Updated 7 years ago
- Botnet command & control monitor☆196Updated 3 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- DarkAgent Remote Administration Tool RAT by DragonHunter☆142Updated 12 years ago
- Tinba Banking Trojan☆87Updated 10 years ago
- Collection of Remote Administration Tool samples☆261Updated 10 years ago
- Pythonic ransomware proof of concept.☆217Updated 5 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆145Updated 6 years ago
- Lightweight remote administrative client written in Java.☆74Updated 5 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- Windows Crypter☆423Updated 8 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- This tool creates almost undetectabe trojan virus to exploit windows machine.☆137Updated 8 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- An IRC bot written in Python.☆74Updated 2 weeks ago
- An IRC based tool for testing the capabilities of a botnet.☆143Updated 5 years ago
- Windows Remote Access Trojan (RAT)☆81Updated 9 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- An open source RansomWare☆88Updated 5 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- This is a advanced ransomware example made in AutoIt☆34Updated 9 years ago