awnumar / nixbotLinks
Lightweight TCP botnet coded in C++
☆27Updated 6 years ago
Alternatives and similar repositories for nixbot
Users that are interested in nixbot are comparing it to the libraries listed below
Sorting:
- C++/C botnet using HTTP C&C☆15Updated 10 years ago
- ☆44Updated 7 years ago
- j0llydmper is a windows service that allows you to dump furtively and automaticaly some contents of USB disks just plugged in your comput…☆39Updated 13 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- Windows Malware☆41Updated 12 years ago
- Passive UAC elevation using dll infection☆74Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- SSH Based Remote Administration Tool☆104Updated 9 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- Small script to assemble/disassemble from CLI☆22Updated 2 years ago
- Tor client library implementation.☆50Updated 12 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- ☆26Updated 8 years ago
- Reverse shell for remote administration☆30Updated 7 years ago
- ☆19Updated 7 years ago
- arp-poison (aka arp spoof) tool☆39Updated 12 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Simple runtime crypter in C++.☆44Updated 10 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆84Updated 4 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 6 months ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆89Updated last year
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- inPEct means "infect", applicable to PE ("Portable Executable") format. It is an executable binder, thus, it's able to join two .exe file…☆21Updated 14 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆54Updated 3 years ago