LukeGT / XSS-Botnet
A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the standards.
☆27Updated 10 years ago
Alternatives and similar repositories for XSS-Botnet:
Users that are interested in XSS-Botnet are comparing it to the libraries listed below
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆45Updated 8 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- SSH Based Remote Administration Tool☆104Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆41Updated 3 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 7 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Updated 4 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- Application to take over mining destination of remote cgminer instances via RPC interface.☆24Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Share wifi on windows with arranged password like every hour or every day☆15Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago