R3tr074 / Burn-ByteLinks
Burn Byte is a modern and powerful DDOS Toolkit
β36Updated 4 years ago
Alternatives and similar repositories for Burn-Byte
Users that are interested in Burn-Byte are comparing it to the libraries listed below
Sorting:
- π¨ Linux Hash Crackerβ31Updated last year
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.β179Updated 3 years ago
- Malware feito em C com algumas funΓ§Γ΅es "extras" como um keyloggerβ18Updated 4 years ago
- Malware and malicious applications databaseβ38Updated last year
- All next level week tracksβ10Updated 4 years ago
- Ransomware hello kittyβ23Updated 4 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.β121Updated 3 years ago
- β19Updated 11 months ago
- β37Updated 3 years ago
- An application to test windows and linux shellcodesβ94Updated last year
- Advanced Vulnerability Scanner Toolβ68Updated last year
- Cross-platform RAT, written in Cβ88Updated 3 years ago
- Yet Another PHP Shell - The most complete PHP reverse shellβ82Updated 3 years ago
- π WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.β27Updated 2 years ago
- Javascript keylogger with web panelβ20Updated 2 years ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.xβ132Updated 2 years ago
- CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injectionβ21Updated 4 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)β33Updated 3 years ago
- β16Updated 3 months ago
- Persistent & Undetectable Malware Backdoorβ29Updated last year
- Let's try to create a rootkit!β20Updated 5 years ago
- This is a cpu tool for testing the floating-points peak performance. Now it supports linux and x86-64 platform. It can automatically recoβ¦β19Updated 4 years ago
- Disable Windows Defender All Versionβ31Updated 4 years ago
- cross-platform C2 framework in python 2β38Updated 3 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OSΒ΄sβ59Updated 2 years ago
- γπ§γRing 3 Rootkit for Windows 10β60Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ23Updated 3 years ago
- π Reverse shell written on python3β14Updated 5 years ago
- A builder for BatchStealerβ19Updated 3 years ago
- All Our Productsβ12Updated 4 years ago