LukeGT / XSS-Botnet
A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the standards.
☆27Updated 10 years ago
Alternatives and similar repositories for XSS-Botnet:
Users that are interested in XSS-Botnet are comparing it to the libraries listed below
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆47Updated 5 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆28Updated 9 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆41Updated 3 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- SSH Based Remote Administration Tool☆105Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆39Updated 3 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆25Updated last year
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Updated 3 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago