A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and control.
☆40Nov 12, 2023Updated 2 years ago
Alternatives and similar repositories for SSH-botnet
Users that are interested in SSH-botnet are comparing it to the libraries listed below
Sorting:
- ☆10Sep 3, 2021Updated 4 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 9 months ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Reset Excel sheet and workbook protection☆10Jun 23, 2019Updated 6 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆16Jan 16, 2022Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Nov 17, 2020Updated 5 years ago
- Weaponized PoC for SMBv3 TCP codec/compression vulnerability☆19Apr 1, 2020Updated 5 years ago
- CVE-2021-22005批量验证python脚本☆13Sep 25, 2021Updated 4 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year
- CVE-2022-22963 Spring-Cloud-Function-SpEL_RCE_exploit☆15Mar 30, 2022Updated 3 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- jsc decrypt tool☆15Jul 17, 2020Updated 5 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31May 22, 2017Updated 8 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- ☆44Jul 9, 2024Updated last year
- 在科研(摸鱼)过程中,收集到的或者自己写的一些有用的(经过实战检验的)exp/poc,欢迎提交issue和PR☆15Oct 15, 2021Updated 4 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- ☆18Sep 14, 2021Updated 4 years ago
- Load the evilDLL from socket connection without touch disk☆15Aug 27, 2021Updated 4 years ago
- ☆317Mar 26, 2024Updated last year