Botnet created in p2p architecture.
☆11May 17, 2018Updated 7 years ago
Alternatives and similar repositories for botnet_p2p
Users that are interested in botnet_p2p are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lightweight TCP botnet coded in C++☆27Jul 22, 2018Updated 7 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆34Apr 1, 2018Updated 8 years ago
- Different examples of process hollowing.☆14Jul 17, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Pattern Scanning Library supporting compile time patterns, both x86_64 and arm64☆20Aug 3, 2025Updated 8 months ago
- Decentralised P2P botnet using toxcore.☆185Feb 8, 2026Updated 2 months ago
- shootenemy.py is a script that you can use object detection for sending mouse movements to an Arduino running the i2c_mouse_move.ino.☆11Jan 31, 2022Updated 4 years ago
- Simple console based Windows key-logger created in C++☆16Nov 5, 2021Updated 4 years ago
- EternalRomance&Eternalchampion&Eternalblue☆10May 1, 2017Updated 8 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Feb 5, 2026Updated 2 months ago
- ☆11Apr 23, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Windows memory hacking library☆22Aug 12, 2018Updated 7 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- win api hooks☆15Jun 8, 2017Updated 8 years ago
- CVE-2020-14882批量验证工具。☆12Dec 1, 2020Updated 5 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆26Mar 31, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- KeePass Two-Channel Auto-Type Obfuscation Keylogger☆10Feb 3, 2016Updated 10 years ago
- Managing items for mediafire-grab.☆11Jun 16, 2022Updated 3 years ago
- Havoc C2 BOF port of the KslD.sys BYOVD technique. Credential extraction from lsass via physical memory — no OpenProcess, no auditable AP…☆62Apr 1, 2026Updated last week
- WIP Java decompiler☆24Dec 3, 2025Updated 4 months ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- Rust port of TLSH☆14Oct 12, 2025Updated 5 months ago
- CVE-2018-4407 IOS/macOS kernel crash☆13Feb 23, 2019Updated 7 years ago
- The Decision Maximizer 3000 optimization project☆10Jan 16, 2022Updated 4 years ago
- Generate a PDB file given the old PDB file and an address mapping☆53Aug 3, 2025Updated 8 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- HTTP Botnet☆922Oct 27, 2020Updated 5 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 3 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 11 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- Reinforcement Learning (RL) is believe to be a more general approach towards Artificial Intelligence (AI). RL is the foundation for many …☆13Dec 22, 2022Updated 3 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago