This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
☆23Sep 2, 2018Updated 7 years ago
Alternatives and similar repositories for botnets
Users that are interested in botnets are comparing it to the libraries listed below
Sorting:
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- Explit is an internal multihack for Counter-Strike: Global Offensive.☆13May 10, 2019Updated 6 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14May 15, 2017Updated 8 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- A simple proxy scraper coded in Python.☆10Feb 4, 2017Updated 9 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- The MacOS ransomware project☆14Jun 24, 2017Updated 8 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- ☆15Jan 21, 2020Updated 6 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Ransomware written in vb.net for eduational purpouses☆13Aug 19, 2016Updated 9 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- Refluxion -- MITM WPA attacks tool☆39Jul 18, 2020Updated 5 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆69Mar 11, 2018Updated 7 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 7 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Jun 14, 2020Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 8 years ago