CNC botnet developed via C
☆17Dec 2, 2016Updated 9 years ago
Alternatives and similar repositories for PooleBotnet
Users that are interested in PooleBotnet are comparing it to the libraries listed below
Sorting:
- Collection Of Terrible CNC/Qbot Panels☆11Aug 8, 2025Updated 7 months ago
- Qbot Source, Scanners, loaders....☆13Jul 2, 2023Updated 2 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆15Sep 29, 2020Updated 5 years ago
- C&C Botnet written in Python with fabric☆36Jun 20, 2022Updated 3 years ago
- A swarm of LLM agents that will help you test, document, and productionize your code!☆16Feb 16, 2026Updated last month
- Anti-Flood: DoS, DDoS, Brute Force, SYN/UDP Flood☆24Apr 8, 2021Updated 4 years ago
- ☆11Jul 13, 2022Updated 3 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Simple way to read wirte delete values from registry☆18Jun 24, 2019Updated 6 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- IRC based botnet developed in C☆43Jul 11, 2017Updated 8 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆20Oct 9, 2021Updated 4 years ago
- Joker Botnet Source LEAKED☆10Jun 5, 2021Updated 4 years ago
- A simple C2 like Slovakia. Based on the Mirai(未来) cnc with ssh.☆12Jan 25, 2022Updated 4 years ago
- Simple bash script to detect and ban ddos IP automaticly.☆16Oct 21, 2015Updated 10 years ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 2 months ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆60Nov 25, 2025Updated 3 months ago
- Extra files for VPN projects☆18Updated this week
- Presenting BomberWhole to Unlimited Messages Any Social Media! 💣☆10Feb 22, 2021Updated 5 years ago
- Collection of DDOS blocking methods☆12Nov 6, 2013Updated 12 years ago
- layer7 mirai private layer4 ovh bypass nfo bypass☆45Aug 11, 2022Updated 3 years ago
- Proxy for efficiently circumventing censorship using existing tools and gathering information about censorship around the world.☆14Jun 27, 2018Updated 7 years ago
- PyDelta is a Python script designed to obfuscate Python source code, making it more difficult to understand and reverse-engineer.☆13Jul 13, 2024Updated last year
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Dec 31, 2021Updated 4 years ago
- ☆13Dec 1, 2019Updated 6 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- A quick, dirty, and effective USB RubberDucky (hak5.com) firmware programming script. Cause typing is hard.☆20Jun 26, 2014Updated 11 years ago
- Botnet written in pure Go☆24Feb 10, 2024Updated 2 years ago
- API that sends a command to a SSH Server from a URL.☆12Oct 31, 2019Updated 6 years ago
- Simple dialogue plugin for Godot☆21May 27, 2023Updated 2 years ago
- Yet Another Youtube Scrapper To Scrap All Info of A Channel☆16Jul 28, 2021Updated 4 years ago
- Lightweight and fast SOCKS5 proxy server☆10Feb 9, 2026Updated last month
- "Overload" is a python program that sends active connections to any target of some sort. It is used to perform a DoS/DDoS attack.☆117Jan 4, 2020Updated 6 years ago
- 白名单机制的本地HTTPS反向代理,可对HTTPS请求的SNI进行修改或去除以突破互联网封锁☆18May 26, 2025Updated 9 months ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Make your IDA Lazy! ida9.0☆20Aug 12, 2024Updated last year
- ☆11Jun 22, 2020Updated 5 years ago
- Automatic monitor github cve using Github Actions☆10Dec 16, 2024Updated last year