3val / AthenaLinks
Athena Botnet Source Code
☆156Updated 10 years ago
Alternatives and similar repositories for Athena
Users that are interested in Athena are comparing it to the libraries listed below
Sorting:
- Dangerous Malwares☆213Updated 8 years ago
- Exploitkit☆185Updated 8 years ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆180Updated 9 years ago
- DarkAgent Remote Administration Tool RAT by DragonHunter☆143Updated 12 years ago
- Bug7sec Team - ransomware open source (web)☆132Updated 8 years ago
- Tinba Banking Trojan☆87Updated 10 years ago
- A Python program that scans RAM.☆40Updated 10 years ago
- Collection of Remote Administration Tool samples☆260Updated 10 years ago
- Windows Remote Access Trojan (RAT)☆86Updated 10 years ago
- Pythonic ransomware proof of concept.☆220Updated 5 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- Botnet command & control monitor☆199Updated 3 years ago
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- This tool creates almost undetectabe trojan virus to exploit windows machine.☆135Updated 8 years ago
- A proof of concept P2P botnet written in Python using the Twisted framework☆48Updated 7 years ago
- An open source RansomWare☆89Updated 6 years ago
- Android Trojan☆196Updated 10 years ago
- Lightweight remote administrative client written in Java.☆74Updated 6 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- Windows Crypter☆422Updated 8 years ago
- Carberp Banking Trojan☆124Updated 10 years ago
- An IRC based tool for testing the capabilities of a botnet.☆143Updated 5 years ago
- Experimental examples of Ransomware in different languages☆37Updated 8 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆144Updated 6 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- This is a advanced ransomware example made in AutoIt☆34Updated 9 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago