d3p0rt / d3pl0y-IRC-BotNetLinks
A C# irc bot malware POC.
☆12Updated 11 years ago
Alternatives and similar repositories for d3pl0y-IRC-BotNet
Users that are interested in d3pl0y-IRC-BotNet are comparing it to the libraries listed below
Sorting:
- Download payload to disk and install it to startup then melt.☆35Updated 6 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆52Updated 4 months ago
- Download a payload and make it run from registry without droppng.☆110Updated 6 years ago
- JS Jscript - download file from url then run it☆62Updated 5 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 9 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆24Updated 7 years ago
- Sorano☆16Updated 6 years ago
- Simple class to search and upload files☆28Updated 6 years ago
- Simple way to read wirte delete values from registry☆18Updated 6 years ago
- A Linux Cyptomining malware☆37Updated 2 years ago
- Revenge-RAT C# Stub - Fixed☆94Updated 5 years ago
- This script make any windows compatible with RDP connection☆21Updated 3 months ago
- Virus RAT v8.0 Beta☆26Updated 8 years ago
- DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.☆22Updated 3 years ago
- Simple example of how to remove all malwares from disk and registry.☆42Updated 6 years ago
- Simple C# Keylogger (Keyboard Layout)☆65Updated 6 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆32Updated 7 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Updated 8 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- Zero-Day Code Injection and Persistence Technique☆29Updated 8 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- Batch NetWork Worm with Download & Execute Payload☆12Updated 5 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆36Updated 6 years ago
- Malicious Software SRC Extract☆74Updated 8 years ago
- C# Admin Control Panel Finder For Windows☆46Updated 6 years ago