This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
☆24Sep 2, 2018Updated 7 years ago
Alternatives and similar repositories for botnets
Users that are interested in botnets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Download files out of open AWS buckets☆39Dec 12, 2018Updated 7 years ago
- Package manager for hackers built by hackers☆37Aug 31, 2018Updated 7 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- A simple proxy scraper coded in Python.☆11Feb 4, 2017Updated 9 years ago
- some python3 functions to add spreading features to any python backdoor☆56Jan 22, 2017Updated 9 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Explit is an internal multihack for Counter-Strike: Global Offensive.☆13May 10, 2019Updated 6 years ago
- The fork of Buildroot used for building toolchains.☆35Nov 23, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Jun 14, 2021Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Deep Learning AI Bots that trade the forex market☆13Jul 14, 2018Updated 7 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Jun 14, 2020Updated 5 years ago
- Confirmed VPN client for Android☆15Jul 30, 2020Updated 5 years ago
- Python IDE for working with plots and data☆17Jun 4, 2017Updated 8 years ago
- Massive scanner to detect exposed .env files across multiple targets.☆13Jan 10, 2026Updated 3 months ago
- ☆11Jun 18, 2025Updated 9 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆27Jul 11, 2022Updated 3 years ago
- Anatomy of a linux kernel development☆27Mar 30, 2017Updated 9 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆25Sep 18, 2017Updated 8 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Mar 7, 2021Updated 5 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Subdomain crawler with wordlist using python☆14Mar 22, 2020Updated 6 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- pure python remote adb scanner + nmap scan module☆22Dec 7, 2018Updated 7 years ago
- Code that allows running another windows PE in the same address space as the host process.☆11Nov 19, 2019Updated 6 years ago
- ☆10Jan 6, 2019Updated 7 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 2 months ago