R3tr074 / Burn-ByteLinks
Burn Byte is a modern and powerful DDOS Toolkit
β37Updated 4 years ago
Alternatives and similar repositories for Burn-Byte
Users that are interested in Burn-Byte are comparing it to the libraries listed below
Sorting:
- π¨ Linux Hash Crackerβ31Updated last year
- Windows Reverse TCP backdoorβ29Updated 6 years ago
- Yet Another PHP Shell - The most complete PHP reverse shellβ82Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.β182Updated 2 years ago
- Malware feito em C com algumas funΓ§Γ΅es "extras" como um keyloggerβ17Updated 4 years ago
- Advanced Vulnerability Scanner Toolβ70Updated last year
- Malware and malicious applications databaseβ38Updated last year
- Ransomware hello kittyβ23Updated 4 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.β121Updated 3 years ago
- β37Updated 3 years ago
- rootkit for tryhackme king of the hillβ12Updated last year
- Bifrost C2. Open-source post-exploitation using Discord APIβ49Updated 3 years ago
- VySecator Is a Python Script Obfuscation Tool, Which can be used to Obfuscate your hand written Malwares and your Hand Written Scripts!β73Updated last year
- π WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.β26Updated 2 years ago
- β πβ£βBlue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT] [Linux RAT] [MAC RAT] } which is fully pβ¦β1Updated 2 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.β67Updated last year
- Javascript keylogger with web panelβ18Updated last year
- Let's try to create a rootkit!β20Updated 5 years ago
- An application to test windows and linux shellcodesβ92Updated 8 months ago
- Painel de consultaβ40Updated 3 years ago
- https://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8β58Updated 4 years ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.xβ128Updated last year
- π Golang project to exploit an EL Injection vulnerability (CVE-2017-1000486) that affects the Primefaces 5.X versions. This project suppβ¦β18Updated 2 years ago
- enemy SSH Telnet IoT botnetβ61Updated 3 years ago
- Create a fully undetectable backdoor with simple steps.β73Updated 3 years ago
- A C2 project that controls a self-propagating MS17-010 worm.β72Updated 4 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ22Updated 2 years ago
- This is a cpu tool for testing the floating-points peak performance. Now it supports linux and x86-64 platform. It can automatically recoβ¦β19Updated 4 years ago
- All Our Productsβ12Updated 4 years ago
- cross-platform C2 framework in python 2β41Updated 3 years ago