☆13May 20, 2019Updated 6 years ago
Alternatives and similar repositories for Android_Botnet
Users that are interested in Android_Botnet are comparing it to the libraries listed below
Sorting:
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- WH-ApkCrypter-V2 100% bypass 2020☆42Oct 4, 2023Updated 2 years ago
- MIRAI botnet in python3☆20Jun 18, 2019Updated 6 years ago
- Just an older botnet☆19Jun 12, 2020Updated 5 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Jan 1, 2021Updated 5 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)☆41Jul 5, 2020Updated 5 years ago
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- Script to install pentest tools on Alpine Linux☆12Jul 3, 2015Updated 10 years ago
- Arduino control of an EMV Smartcard reader for ATMs☆14Nov 22, 2017Updated 8 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- - Automated Discord bot for Submitting Rebates and getting you easy visa cards. Educational purposes only.☆16May 13, 2021Updated 4 years ago
- convert javascript shellcode to c source code☆11Mar 27, 2020Updated 5 years ago
- Windows frontend for digging SSH tunnels and creating socks proxies☆12Nov 19, 2023Updated 2 years ago
- .NET Code Virtualization with cool features. Once intended to sell. Rip VirtualGuard.io☆16Feb 8, 2026Updated 3 weeks ago
- .NET 4.5 Remote Access Tool (RAT) implementation with Telegram's API as server☆11Jul 29, 2022Updated 3 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated last year
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ccm - A small python library that helps identify vulnerabilities inside of encrypted data☆11Aug 17, 2020Updated 5 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Web Information Gathering☆18Feb 23, 2015Updated 11 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Changes the window titles of running processes.☆10Aug 15, 2019Updated 6 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- Test antiviruses☆12Dec 3, 2023Updated 2 years ago