Botnet created in p2p architecture.
☆11May 17, 2018Updated 7 years ago
Alternatives and similar repositories for botnet_p2p
Users that are interested in botnet_p2p are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- P2P botnet detection by tracking conversations☆28Jun 5, 2015Updated 10 years ago
- Different examples of process hollowing.☆14Jul 17, 2020Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Simple console based Windows key-logger created in C++☆15Nov 5, 2021Updated 4 years ago
- EternalRomance&Eternalchampion&Eternalblue☆10May 1, 2017Updated 8 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- Automatically compiled list of file hashes associated with the IoT malware Hajime and its components.☆15Mar 30, 2018Updated 8 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- fork of the NMAP's silent WinPCAP installer☆17Nov 9, 2016Updated 9 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Feb 5, 2026Updated 2 months ago
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Load driver on boot before anti-cheats☆41Feb 2, 2024Updated 2 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Windows memory hacking library☆23Aug 12, 2018Updated 7 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆14Oct 11, 2020Updated 5 years ago
- ☆11Apr 23, 2019Updated 7 years ago
- win api hooks☆15Jun 8, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆27Apr 21, 2026Updated last week
- KeePass Two-Channel Auto-Type Obfuscation Keylogger☆10Feb 3, 2016Updated 10 years ago
- Managing items for mediafire-grab.☆11Jun 16, 2022Updated 3 years ago
- WIP Java decompiler☆24Dec 3, 2025Updated 4 months ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- CVE-2018-4407 IOS/macOS kernel crash☆13Feb 23, 2019Updated 7 years ago
- The Decision Maximizer 3000 optimization project☆10Jan 16, 2022Updated 4 years ago
- Generate a PDB file given the old PDB file and an address mapping☆53Aug 3, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- HTTP Botnet☆923Oct 27, 2020Updated 5 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 3 years ago
- ATM Configurator aka Tyupkin trojan☆11Mar 23, 2015Updated 11 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆13Aug 31, 2017Updated 8 years ago
- Reinforcement Learning (RL) is believe to be a more general approach towards Artificial Intelligence (AI). RL is the foundation for many …☆13Dec 22, 2022Updated 3 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago