dxdxdt / proone
A Linux worm targeting vulnerable IoT devices with MMU. Reengineered from/inspired by Mirai botnet.
☆18Updated 2 years ago
Alternatives and similar repositories for proone:
Users that are interested in proone are comparing it to the libraries listed below
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆23Updated 2 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆15Updated 5 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆27Updated last year
- Layer 7 DDoS tool that supports sophisticated attack methods.☆25Updated 2 months ago
- AXIS Botnet☆15Updated 10 months ago
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆37Updated 2 years ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆24Updated 3 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 9 months ago
- An ADB-based botnet written in C.☆44Updated 2 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 2 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methods☆33Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆76Updated last year
- UAdmin Phishlets for common sites☆13Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆31Updated 2 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆8Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- A fast, lightweight botnet written in pure C.☆34Updated 3 years ago
- A simple script to obfuscate batch(bat) code easily☆22Updated last year
- A builder for BatchStealer☆22Updated 2 years ago
- Steal telegram session Bypass 2fa☆18Updated 2 years ago
- layer7 mirai private layer4 ovh bypass nfo bypass☆33Updated 2 years ago
- Contact Telegram : https://t.me/hakanonymos☆52Updated 10 months ago
- Katana Botnet used for DDoS attacks based on the Mirai Botnet. TEACHING PURPOSES ONLY! I CANNOT BE HELD RESPONSIBLE FOR ANYTHING YOU DO W…☆47Updated 2 years ago
- This app is an advanced XSS panel, this is used for session grabbing with XSS exploit and <img src="grabber_url">☆29Updated 2 years ago
- Just an older botnet☆14Updated 4 years ago
- Fully Undetectable telegram Rat dropper☆33Updated 4 years ago