Botnet created in p2p architecture.
☆11May 17, 2018Updated 8 years ago
Alternatives and similar repositories for botnet_p2p
Users that are interested in botnet_p2p are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lightweight TCP botnet coded in C++☆27Jul 22, 2018Updated 7 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- A proof of concept P2P botnet written in Python using the Twisted framework☆48Apr 30, 2018Updated 8 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆34Apr 1, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Different examples of process hollowing.☆14Jul 17, 2020Updated 5 years ago
- Pattern Scanning Library supporting compile time patterns, both x86_64 and arm64☆20Aug 3, 2025Updated 9 months ago
- Decentralised P2P botnet using toxcore.☆184Feb 8, 2026Updated 3 months ago
- A small utilitiy to scan process memory and search patterns using frida with a single line of command☆22Aug 4, 2021Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- Simple console based Windows key-logger created in C++☆15Nov 5, 2021Updated 4 years ago
- EternalRomance&Eternalchampion&Eternalblue☆10May 1, 2017Updated 9 years ago
- Automatically compiled list of file hashes associated with the IoT malware Hajime and its components.☆15Mar 30, 2018Updated 8 years ago
- fork of the NMAP's silent WinPCAP installer☆17Nov 9, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- ExportHider: Generating Export Table during Runtime to Hide the Exported Functions from the DLL File.☆33Apr 12, 2026Updated last month
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Windows memory hacking library☆23Aug 12, 2018Updated 7 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- ☆11Apr 23, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CVE-2020-14882批量验证工具。☆12Dec 1, 2020Updated 5 years ago
- win api hooks☆15Jun 8, 2017Updated 8 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- KeePass Two-Channel Auto-Type Obfuscation Keylogger☆10Feb 3, 2016Updated 10 years ago
- Managing items for mediafire-grab.☆11Jun 16, 2022Updated 3 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆15Oct 11, 2020Updated 5 years ago
- WIP Java decompiler☆24Dec 3, 2025Updated 5 months ago
- A collection of scheduling implementations for Java☆15May 7, 2026Updated last week
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Rust port of TLSH☆14Oct 12, 2025Updated 7 months ago
- Simple Tool for webhacking☆10Apr 4, 2023Updated 3 years ago
- HTTP Botnet☆925Oct 27, 2020Updated 5 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆13Aug 31, 2017Updated 8 years ago
- Reinforcement Learning (RL) is believe to be a more general approach towards Artificial Intelligence (AI). RL is the foundation for many …☆13Dec 22, 2022Updated 3 years ago
- Generate a PDB file given the old PDB file and an address mapping☆55Aug 3, 2025Updated 9 months ago