IRC based botnet developed in C
☆43Jul 11, 2017Updated 8 years ago
Alternatives and similar repositories for ZBOT-Botnet
Users that are interested in ZBOT-Botnet are comparing it to the libraries listed below
Sorting:
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆14Sep 29, 2020Updated 5 years ago
- I know! Word in the DDoS community this Mortem botnet isn't as scary as it seems. You feel more powerful as you scroll around the methods…☆52Mar 17, 2023Updated 2 years ago
- A skid ripped source of the Dream qBot Botnet developed By Komodo. Leaked By Tiger. Enjoy, it comes with instructions!☆12Oct 5, 2020Updated 5 years ago
- A little qBot developed by Komodo, released by Tiger & Komodo. Dream has the basic home connection methods, server methods, special serve…☆21Oct 5, 2020Updated 5 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆11Nov 21, 2022Updated 3 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methods☆33Aug 4, 2022Updated 3 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆24Mar 27, 2017Updated 8 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- Mirai Botnet DB Project☆26Mar 20, 2019Updated 6 years ago
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆16Aug 17, 2015Updated 10 years ago
- CNC botnet developed via C☆17Dec 2, 2016Updated 9 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆20Oct 9, 2021Updated 4 years ago
- A simple botnet that propagates via TELNET, controlled via IRC server, can execute shell commands and launch DDoS attacks☆16Nov 24, 2017Updated 8 years ago
- Bot simples para manter acesso em máquinas Windows.☆29Aug 6, 2015Updated 10 years ago
- ☆10Jul 16, 2024Updated last year
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- ☆10Jun 1, 2022Updated 3 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22May 14, 2017Updated 8 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- The Open Tor Botnet (ZIB)☆33Aug 14, 2015Updated 10 years ago
- MIRAI botnet in python3☆20Jun 18, 2019Updated 6 years ago
- enemy SSH Telnet IoT botnet☆61Apr 28, 2022Updated 3 years ago
- Telegram BotNet☆35Dec 9, 2023Updated 2 years ago
- HTTP botnet☆63Jul 30, 2016Updated 9 years ago
- Athena Botnet Source Code☆155Sep 25, 2015Updated 10 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 10 years ago
- Collection Of Terrible CNC/Qbot Panels☆11Aug 8, 2025Updated 6 months ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- An ADB-based botnet written in C.☆48May 3, 2022Updated 3 years ago
- People have been wanting this Mirai Botnet for awhile now. The Joker Mirai V1 developed by IoTNet himself. This powerful botnet has the b…☆139Mar 17, 2023Updated 2 years ago
- Setup mirai botnet. Only for educational purpose!☆111Jul 3, 2024Updated last year
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆183Oct 6, 2016Updated 9 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- Life OpSec Guide on how to stay more anonymous, private, and secure in life. Take greater procatuations, and quit being tracked and mass …☆13Oct 20, 2022Updated 3 years ago