gingteam / poopnet
Simple botnet written in Go.
β9Updated 2 years ago
Alternatives and similar repositories for poopnet:
Users that are interested in poopnet are comparing it to the libraries listed below
- π§ C# UAC Bypass technique using mock directories π§β29Updated 2 years ago
- A fast, lightweight botnet written in pure C.β36Updated 3 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Pβ¦β15Updated 3 years ago
- π Reverse shell written on python3β15Updated 4 years ago
- βA script that turns off Windows Defenderβ23Updated 2 years ago
- govenom is a msfvenom-inspired cross-platform payload generator toolkit written in Goβ20Updated 4 years ago
- Source Code for BlueEagle jRAT & Release β πβ£βBlue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]β¦β1Updated 2 years ago
- A cross-platform remote administration tool written in Javaβ17Updated 4 years ago
- A Windows lightweight RAT written in C++β9Updated 4 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TORβ46Updated 2 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero dayβ48Updated 2 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellcβ¦β15Updated 2 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also containsβ¦β12Updated 4 years ago
- Unpacking tool for the zipExec Crypterβ13Updated 3 years ago
- Use CMSTP.exe to bypass UAC.β40Updated 2 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the malβ¦β14Updated 3 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps onβ¦β15Updated 3 months ago
- MBR virusβ21Updated 3 years ago
- A proof-of-concept Node.js ransomwareβ21Updated 2 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.β13Updated 3 years ago
- Zero-day vulnerabilities affecting Microsoft Exchange Serverβ12Updated 2 years ago
- Multi-threading wget golangβ13Updated 10 months ago
- CHAOS RAT web panel path RCE PoCβ28Updated 9 months ago
- Making Shellcode fully undetectable using uuidβ23Updated 3 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OSβ44Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β19Updated 2 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.β66Updated 5 years ago
- NVD semiupdated database to be used with CVEScannerV2β12Updated 2 weeks ago
- β35Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated last year