davicatunda / BotnetZeusP2P
(In Progress) aims to develop an environment capable to simulate Botnet P2P Zeus,
☆9Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for BotnetZeusP2P
- Remote Access Trojan(RAT), Miner, DDoS☆30Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- Virus RAT v8.0 Beta☆21Updated 7 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- Various Crypter Project☆9Updated 10 years ago
- ⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan☆25Updated 6 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- A Chrome extension to steal your passwords☆20Updated 3 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- iSpy Keylogger☆41Updated 7 years ago
- An index which uses 'spiders' to crawl and explore every discoverable hidden service on Tor.☆9Updated 6 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Updated 6 years ago
- Python emulation of the Conficker worm☆8Updated 10 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆25Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆15Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆17Updated 8 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago