GotchaPython / DyperLinks
Discord botnet bot written in python
☆10Updated 8 years ago
Alternatives and similar repositories for Dyper
Users that are interested in Dyper are comparing it to the libraries listed below
Sorting:
- Malware USB Spread | POC | Example☆8Updated 6 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- HTTP BOTNET☆8Updated 2 years ago
- a simple, barely functional, prototyping RAT (Remote Administration Tool)☆9Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- A simple AES malware crypter☆16Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Random stuff☆16Updated 7 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Updated last year
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- SkyRAT - Powershell Remote Administration Tool☆32Updated 7 years ago
- My public exploit collection.☆31Updated 6 years ago
- Windows Process Injection Toolkit - plain and simple :)☆26Updated 6 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Updated 9 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- ☆23Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- Simple way to read wirte delete values from registry☆18Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- first commit☆10Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago