TCP Undetected BotNet
☆22Jan 12, 2022Updated 4 years ago
Alternatives and similar repositories for WildNet
Users that are interested in WildNet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A basic .NET obfuscator uses dnlib, Modded KoiVM on decryption methods. Not stable for now, works on "crack me" executables.☆29Oct 24, 2021Updated 4 years ago
- Lightweight TCP botnet coded in C++☆27Jul 22, 2018Updated 7 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Nov 29, 2022Updated 3 years ago
- A c# cracker tool for bitcoin brainwallets and other low entropy key algorithms.☆20Sep 15, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- free miner for google cloud shell☆38Jan 30, 2022Updated 4 years ago
- Stealer written on C#, logs will be sent to Discord Webhook.☆27Jan 27, 2022Updated 4 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- A C++ crypto clipper with persistence and mutex☆33Jan 23, 2022Updated 4 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- Tron (TRX) address Generator and Hunting Online☆14Aug 19, 2022Updated 3 years ago
- Phantom Dashboard GUI built using Python & Kivy☆12Mar 31, 2021Updated 5 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- ☆11Jun 30, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The repository contains code for creating dataset for Indian names by preprocessing with some available datasets on google .☆13Sep 25, 2018Updated 7 years ago
- This page should help you with the recon for security issues.☆20Oct 14, 2022Updated 3 years ago
- A complete Selfbot project with high destruction and management power. Wrapper powered by discord.py-self☆18Nov 10, 2022Updated 3 years ago
- CC-Checker With Python☆17Oct 9, 2021Updated 4 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- CC Checker Telegram Bot☆11Jun 13, 2022Updated 3 years ago
- :+1: Useful shell scripts in one place☆13Apr 12, 2026Updated 3 weeks ago
- 🛠️ Simple EXE-File Pumper, written in C#☆17Nov 7, 2020Updated 5 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆33Jun 16, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Burp Extension to manipulate AES encrypted payloads☆13Feb 4, 2022Updated 4 years ago
- Bulk convert #Bitcoin private keys from extended hex to WIF.☆32Apr 11, 2026Updated 3 weeks ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.☆12Nov 27, 2020Updated 5 years ago
- Takes a 10 digit Indian cell phone number and displays the Operator name and the location of that number☆14Aug 21, 2015Updated 10 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 5 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆17Jul 6, 2021Updated 4 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Run shellcode via EnumDesktopsA. C++ implementation☆13Jun 27, 2022Updated 3 years ago
- ☆11Apr 23, 2019Updated 7 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆10Dec 12, 2020Updated 5 years ago
- ☆10Jun 2, 2023Updated 2 years ago
- Multiplatform multithread efficient stream rust ransomware☆15May 18, 2022Updated 3 years ago
- 「🧹」Clear logs after an invasion☆18Dec 7, 2024Updated last year