chuckixia / Mirai-Source-CodeLinks
Leaked Mirai Source Code - make it vagrantized
☆29Updated 4 years ago
Alternatives and similar repositories for Mirai-Source-Code
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
Sorting:
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- ☆16Updated 9 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- ☆90Updated 8 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 3 years ago
- spectrum monitoring system for GSM providers☆44Updated 10 years ago
- A shellcode testing harness.☆70Updated last year
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Linux rootkit and detection examples☆32Updated 10 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Updated 4 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Updated 7 years ago
- intel amt honeypot☆18Updated 8 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 9 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago