chuckixia / Mirai-Source-CodeLinks
Leaked Mirai Source Code - make it vagrantized
☆29Updated 4 years ago
Alternatives and similar repositories for Mirai-Source-Code
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
Sorting:
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 8 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- ☆16Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- ☆17Updated 8 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- TCP session interception and injection framework☆55Updated 14 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- ☆50Updated 9 years ago
- Scripts created by MRG Effitas☆42Updated 9 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago