An archive of BASHLITE source code
☆12Oct 29, 2016Updated 9 years ago
Alternatives and similar repositories for BASHLITE
Users that are interested in BASHLITE are comparing it to the libraries listed below
Sorting:
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- StoreGG Dashboard & API - MySQL Version☆10Mar 19, 2023Updated 2 years ago
- A CVE-2025-55182(React2Shell) Toolbox Application☆34Dec 22, 2025Updated 2 months ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 8 months ago
- A skid ripped source of the Dream qBot Botnet developed By Komodo. Leaked By Tiger. Enjoy, it comes with instructions!☆12Oct 5, 2020Updated 5 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 2 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- Homo Network - The best ddos botnet in 2023☆13Apr 27, 2023Updated 2 years ago
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- ☆10Feb 20, 2026Updated 2 weeks ago
- 网络爬虫(又称为网页蜘蛛,网络机器人,在FOAF社区中间,更经常的称为网页追逐者),是一种按照一定的规则,自动地抓取万维网信息的程序或者脚本。另外一些不常使用的名字还有蚂蚁、自动索引、模拟程序或者蠕虫。☆10Aug 2, 2023Updated 2 years ago
- Noteb-B web漏洞靶场平台☆15Jul 7, 2021Updated 4 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Build your own cloud virtual machine lab☆12Nov 25, 2025Updated 3 months ago
- Toolkit for Machine Learning & Analytics Use Cases.☆13Aug 30, 2018Updated 7 years ago
- ☆10Mar 10, 2019Updated 6 years ago
- 通过 FastCGI 协议,与 php-fpm 交互,将 php 解析,从而使 .php 文件被翻译为 .html 文件☆14Dec 23, 2017Updated 8 years ago
- Bulk delete Tweets you have liked on Twitter!☆13Aug 14, 2023Updated 2 years ago
- ☆14Nov 26, 2021Updated 4 years ago
- Bready header-only libraries.☆11Apr 21, 2025Updated 10 months ago
- ☆12Aug 8, 2019Updated 6 years ago
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Dec 26, 2022Updated 3 years ago
- Bad bad bad bad bad stuff☆12Jun 10, 2019Updated 6 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Minimal executables for Linux☆14Jan 21, 2022Updated 4 years ago
- IRC based botnet developed in C☆43Jul 11, 2017Updated 8 years ago
- 北航软件学院编译原理实验首页☆10Oct 31, 2023Updated 2 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- Simple Python botnet.☆11Jul 8, 2022Updated 3 years ago
- code for EMNLP2018 paper 'Associative-multichannel-autoencoder for multimodal word representation'☆13Aug 24, 2018Updated 7 years ago
- A game of minesweeper with only one square to sweep. Fun for the whole family.☆13Oct 15, 2022Updated 3 years ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- fflags是基于C语言的命令行参数解析程序☆10Dec 6, 2021Updated 4 years ago
- 计算机病毒与免疫系统☆13Jul 18, 2014Updated 11 years ago
- 构建核桃派系统镜像☆14Feb 10, 2026Updated 3 weeks ago
- Golang entry-task of Shopee☆15Nov 9, 2022Updated 3 years ago