Batch NetWork Worm with Download & Execute Payload
☆10May 26, 2020Updated 5 years ago
Alternatives and similar repositories for NetWorm
Users that are interested in NetWorm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PHP Telnet Client (shell) supporting scripting, multi protocols and encrypted connections.☆10Jun 17, 2016Updated 9 years ago
- A small, useless, self-replicating virus that injects itself into a windows executable binary. Upon execution, it will infect all the oth…☆14Dec 26, 2017Updated 8 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆24May 1, 2017Updated 9 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- Library system for windows batch files using batch macros☆15Feb 12, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- System Scanner for Windows☆18Jul 20, 2022Updated 3 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Feb 4, 2017Updated 9 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Mar 13, 2017Updated 9 years ago
- Totally anonymous botnet client with an emphasis on individual zombie control, resiliency of the host machine, and ease of remote code ex…☆17Jan 25, 2023Updated 3 years ago
- A cloud based remote android managment suite, powered by NodeJS☆27Dec 12, 2022Updated 3 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆46Jan 19, 2018Updated 8 years ago
- Network Security Fundamentals final class assignment used to show proficiency and understanding of network security. Built with Python an…☆12Jan 2, 2021Updated 5 years ago
- Python implementation of Gnutella for CS 114 P2P systems☆12Mar 23, 2012Updated 14 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆23Mar 27, 2017Updated 9 years ago
- A little Python script for LAN OS detection (nmap -O)☆22Oct 7, 2015Updated 10 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆101Nov 8, 2017Updated 8 years ago
- ☆10Jan 9, 2021Updated 5 years ago
- Un simple client-serveur avec connexions gérées via Socket. Le client est écrit en C et le serveur en Python. J'ai commencé ce projet po…☆12May 19, 2020Updated 5 years ago
- Un simple reverse shell indétectable (1/65 sur virustotal au 12/02/2022) écrit en C# qui utilise un client socket UDP sur le port 53 (por…☆12Feb 12, 2022Updated 4 years ago
- Exploit Pack - One step ahead☆11Sep 9, 2013Updated 12 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- This is a python project for image download from e-hentai and exhentai galleries while automatically searching for proxies.☆13Aug 25, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Some handy scripts to collect hosts installed redis (using Shodan search engine) and exploit them☆33Sep 4, 2016Updated 9 years ago
- ☆16May 6, 2015Updated 10 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- Crypto coin mixer☆10Feb 14, 2018Updated 8 years ago
- RIG Exploit Kit (front end)☆31Feb 25, 2015Updated 11 years ago
- An FTP client module for node.js☆25Feb 23, 2023Updated 3 years ago
- Download payload to disk and install it to startup then melt.☆33Apr 9, 2019Updated 7 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆23Aug 21, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A peer-to-peer routing protocol to run your decentralized network.☆24Mar 9, 2022Updated 4 years ago
- Script to install pentest tools on Alpine Linux☆10Jul 3, 2015Updated 10 years ago
- Tous les trucs utilisés dans les Tutos, les shellcodes, les templates, les notes...☆14Jan 15, 2024Updated 2 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Dec 13, 2023Updated 2 years ago
- A TELNET client class in PHP☆17Mar 17, 2019Updated 7 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆531Oct 5, 2022Updated 3 years ago
- This tool covers Motorola XML files to batch files for flashing firmware to Motorola Android Phones☆21Jul 25, 2020Updated 5 years ago