A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and control.
☆39Nov 12, 2023Updated 2 years ago
Alternatives and similar repositories for SSH-botnet
Users that are interested in SSH-botnet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆22Feb 12, 2023Updated 3 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- go调用最大cpu内核数实现批量ip列表tcp端口快速扫描☆15Mar 20, 2020Updated 6 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- jsc decrypt tool☆15Jul 17, 2020Updated 5 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- Weaponized PoC for SMBv3 TCP codec/compression vulnerability☆19Apr 1, 2020Updated 6 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.☆12Nov 27, 2020Updated 5 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- it is an osint tool which is used to extract information from your facebook friends like email address, phone number or many other things☆30Jul 8, 2020Updated 5 years ago
- Botnet targeting Windows machines 🐍☆48Feb 25, 2026Updated last month
- A C2 project that controls a self-propagating MS17-010 worm.☆77Jun 18, 2021Updated 4 years ago
- ☆18Sep 14, 2021Updated 4 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- ☆44Jul 9, 2024Updated last year
- Python script to login to gmail account using selenium. Script works in both Python 2 and Python 3☆17Jul 21, 2022Updated 3 years ago
- 在科研(摸鱼)过程中,收集到的或者自己写的一些有用的(经过实战检验的)exp/poc,欢迎提交issue和PR☆16Oct 15, 2021Updated 4 years ago
- FOSS Patcher in Batchfile for Windows Users to bypass Windows 11 Restrictions - Unfinished☆15Oct 8, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- jgraphx 4.0.4 build for cs project☆22Oct 23, 2020Updated 5 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 10 months ago
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- Locates your Wi-Fi-enabled machine using Wi-Fi access points signal strengths, using Google's API☆20Jul 3, 2017Updated 8 years ago
- ☆319Mar 26, 2024Updated 2 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- A collection of penetration testing tools written in Python 2☆14Sep 16, 2019Updated 6 years ago