Taiiwo / cicadaLinks
A python library for working with the Liber Primus
☆18Updated last month
Alternatives and similar repositories for cicada
Users that are interested in cicada are comparing it to the libraries listed below
Sorting:
- ☆118Updated 2 years ago
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆185Updated last year
- Thirteen Years of Tor Attacks☆314Updated 2 years ago
- EndGame DDoS filter.☆260Updated 3 years ago
- Hybrid Botnet over TOR targeting Linux machines☆11Updated 4 years ago
- Python controller library for Tor☆311Updated last year
- Metadata Anonymisation Toolkit☆100Updated 5 years ago
- A tiny Tor client implementation (in pure python).☆133Updated last year
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆223Updated 11 months ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆219Updated 2 years ago
- Build a basic Command & Control botnet in C☆373Updated 4 years ago
- Simple python malware for back connect in windows☆58Updated 7 years ago
- Transform regular Python code into a human-averse, yet still-functional equivalent.☆60Updated 7 months ago
- MyDoom source☆63Updated 9 years ago
- A dead man's switch which will send out a prerecorded message via email or SMS to predetermined people☆26Updated 3 years ago
- The Mirai Botnet Source Code in Python☆39Updated 6 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆288Updated 2 years ago
- Decentralised P2P botnet using toxcore.☆176Updated 2 years ago
- Setup mirai botnet. Only for educational purpose!☆94Updated last year
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆32Updated 5 years ago
- 🛡️ Anonymous F2F network based on the QB-problem & GP/12 protocol stack. Uses post-quantum cryptographic algorithms: ML-KEM, ML-DSA☆142Updated 2 weeks ago
- ☆658Updated last year
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆46Updated 2 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆79Updated 2 years ago
- [Mirai] Mirai Iot Botnet && Tutorial !☆306Updated 4 years ago
- Metamorphic engine written in Rust.☆16Updated 3 years ago
- Worm implemented in Python☆86Updated 9 years ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆482Updated 2 weeks ago
- Find interesting internet-exposed cameras through the Shodan API☆15Updated 4 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆510Updated 2 years ago