chuckixia / Mirai-Source-Code
Leaked Mirai Source Code - make it vagrantized
☆29Updated 3 years ago
Alternatives and similar repositories for Mirai-Source-Code:
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- ☆15Updated 8 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- intel amt honeypot☆18Updated 7 years ago
- Utility to decompress Linux swsusp hibernation file.☆27Updated 3 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- ☆17Updated 7 years ago
- A shellcode testing harness.☆69Updated 8 months ago
- Materials for 44con 2014 CANAPE Workshop☆22Updated 10 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- Mixing up CVE and MS like a pro☆24Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- library to decode/parse zeus-like configuration files☆29Updated 7 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Various tools to track the Mirai botnet☆20Updated 8 years ago
- Linux rootkit and detection examples☆32Updated 9 years ago
- ☆20Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago