complex webshell manager, quasi-http botnet.
☆283Feb 2, 2015Updated 11 years ago
Alternatives and similar repositories for quasibot
Users that are interested in quasibot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- the cross platform webshell tool in .NET☆533May 19, 2016Updated 9 years ago
- Manage your website via terminal☆424May 29, 2021Updated 4 years ago
- w8ay 一句话WEB端管理工具☆178Feb 1, 2017Updated 9 years ago
- Athena Botnet Source Code☆152Sep 25, 2015Updated 10 years ago
- Bash simulator to control a server using PHP system functions.☆100Nov 21, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- php tool for network scanning☆20May 7, 2015Updated 11 years ago
- Weaponized web shell☆3,519Oct 1, 2025Updated 7 months ago
- Distributed File Storage Using JavaScript Botnets☆112Aug 16, 2013Updated 12 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆331Apr 19, 2017Updated 9 years ago
- Botnet command & control monitor☆201May 23, 2022Updated 3 years ago
- Cknife☆2,427Nov 29, 2023Updated 2 years ago
- An IRC bot written in Python.☆76Apr 21, 2026Updated 2 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,164Mar 6, 2025Updated last year
- Wordpress Brute Force Multithreading with standard and xml-rpc login☆87Apr 21, 2017Updated 9 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆793Sep 30, 2020Updated 5 years ago
- Python botnet and backdoor☆1,621Mar 2, 2023Updated 3 years ago
- PHP Frontend to work with the SQLMAP JSON API Server (sqlmapapi.py) to allow for a Web GUI to drive near full functionality of SQLMAP!☆325Aug 31, 2015Updated 10 years ago
- ☆16May 6, 2015Updated 11 years ago
- Power Loader botnet☆38Feb 25, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Php Codz Hacking☆671Sep 5, 2015Updated 10 years ago
- Advanced Web Shell☆580May 1, 2017Updated 9 years ago
- CMS Exploit Framework☆194Nov 30, 2014Updated 11 years ago
- Lightweight TCP botnet coded in C++☆27Jul 22, 2018Updated 7 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,274Sep 4, 2022Updated 3 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Data exfiltration PoC scripts☆24Sep 11, 2015Updated 10 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- HTTP weak pass scanner☆915Sep 7, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 动态多线程敏感信息泄露检测工具☆1,141Dec 17, 2016Updated 9 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆26Apr 20, 2014Updated 12 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,515Jan 21, 2020Updated 6 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,045Nov 24, 2019Updated 6 years ago
- Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom valid…☆882Apr 9, 2021Updated 5 years ago