Batch NetWork Worm with Download & Execute Payload
☆12May 26, 2020Updated 5 years ago
Alternatives and similar repositories for NetWorm
Users that are interested in NetWorm are comparing it to the libraries listed below
Sorting:
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- A small, useless, self-replicating virus that injects itself into a windows executable binary. Upon execution, it will infect all the oth…☆14Dec 26, 2017Updated 8 years ago
- Totally anonymous botnet client with an emphasis on individual zombie control, resiliency of the host machine, and ease of remote code ex…☆18Jan 25, 2023Updated 3 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Mar 13, 2017Updated 8 years ago
- Скрытие процессов и файлов в user mode☆24Dec 22, 2019Updated 6 years ago
- A cloud based remote android managment suite, powered by NodeJS☆28Dec 12, 2022Updated 3 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆24Mar 27, 2017Updated 8 years ago
- Just an older botnet☆19Jun 12, 2020Updated 5 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Aug 21, 2022Updated 3 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Feb 4, 2017Updated 9 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 11 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- Crypto coin mixer☆10Feb 14, 2018Updated 8 years ago
- Scutex is a .Net licensing system built on top of WPF and WCF and .Net 4☆16Aug 8, 2012Updated 13 years ago
- Script to install pentest tools on Alpine Linux☆12Jul 3, 2015Updated 10 years ago
- Generic methods for retrying functions and actions in .NET☆10Oct 28, 2019Updated 6 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- using VBS to download and install a powershell malware☆39Jun 28, 2019Updated 6 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- PHP Telnet Client (shell) supporting scripting, multi protocols and encrypted connections.☆10Jun 17, 2016Updated 9 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- C# library for calling executable files☆10Dec 3, 2018Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- A PowerShell script to automatically configure for the highest privacy and control settings in Windows 10.☆10Aug 16, 2024Updated last year
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago