This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
☆23Sep 2, 2018Updated 7 years ago
Alternatives and similar repositories for botnets
Users that are interested in botnets are comparing it to the libraries listed below
Sorting:
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- A simple proxy scraper coded in Python.☆10Feb 4, 2017Updated 9 years ago
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆11Jul 24, 2025Updated 7 months ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- 在目标主机上执行php、asp、aspx 插件☆23Feb 1, 2019Updated 7 years ago
- Explit is an internal multihack for Counter-Strike: Global Offensive.☆13May 10, 2019Updated 6 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 8 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Deep Learning AI Bots that trade the forex market☆13Jul 14, 2018Updated 7 years ago
- Confirmed VPN client for Android☆15Jul 30, 2020Updated 5 years ago
- Python IDE for working with plots and data☆17Jun 4, 2017Updated 8 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- Massive scanner to detect exposed .env files across multiple targets.☆13Jan 10, 2026Updated 2 months ago
- ☆11Jun 18, 2025Updated 9 months ago
- ☆27Jul 11, 2022Updated 3 years ago
- Python-automated program for finding and exploiting arbitrage opportunities in international currency exchange market using high frequenc…☆16Oct 27, 2021Updated 4 years ago
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 8 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- Subdomain crawler with wordlist using python☆14Mar 22, 2020Updated 6 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- Dump messages and media info from list of Telegram channels to CSV and monitor for changes☆31Jan 21, 2020Updated 6 years ago
- Code that allows running another windows PE in the same address space as the host process.