A C2 project that controls a self-propagating MS17-010 worm.
☆76Jun 18, 2021Updated 4 years ago
Alternatives and similar repositories for M-Botnet
Users that are interested in M-Botnet are comparing it to the libraries listed below
Sorting:
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 5 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- Malware capable of controlling many remote machines.☆24Dec 28, 2024Updated last year
- Decentralised P2P botnet using toxcore.☆181Feb 8, 2026Updated last month
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Fully Functional MS17-10 EternalBlue Exploit Written in C++ on windows for windows☆14Sep 6, 2020Updated 5 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- IT'S MY CODE ! DDOS Archive by D1GG3R (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)☆37Apr 5, 2020Updated 5 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- RAT - HTTP based. Undetectable!☆52Dec 13, 2019Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Mar 17, 2021Updated 5 years ago
- The Open Tor Botnet (ZIB)☆33Aug 14, 2015Updated 10 years ago
- Setup mirai botnet. Only for educational purpose!☆112Jul 3, 2024Updated last year
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆27Oct 2, 2021Updated 4 years ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆116May 30, 2021Updated 4 years ago
- Remote Access Tool, Command & Control, based on the github project Ares, but written in python 3 with some extra features.☆37Mar 8, 2021Updated 5 years ago
- A C# irc bot malware POC.☆12Jul 29, 2014Updated 11 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143May 30, 2019Updated 6 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- People have been wanting this Mirai Botnet for awhile now. The Joker Mirai V1 developed by IoTNet himself. This powerful botnet has the b…☆139Mar 17, 2023Updated 3 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- An open-source, centralized HTTPS botnet☆79Apr 11, 2023Updated 2 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago