AXIS Botnet
☆16May 16, 2024Updated last year
Alternatives and similar repositories for AXIS
Users that are interested in AXIS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fast, lightweight botnet written in pure C.☆41Nov 10, 2021Updated 4 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆13Jul 3, 2019Updated 6 years ago
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 9 months ago
- An ADB-based botnet written in C.☆46May 3, 2022Updated 4 years ago
- High-performance website testing tool written in Golang.☆33Jan 18, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bash script to generate reverse shell payloads☆18Sep 9, 2023Updated 2 years ago
- People have been wanting this Mirai Botnet for awhile now. The Joker Mirai V1 developed by IoTNet himself. This powerful botnet has the b…☆140Mar 17, 2023Updated 3 years ago
- ☆24Jul 13, 2022Updated 3 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆10May 4, 2023Updated 3 years ago
- Thanatos.☆16Apr 29, 2021Updated 5 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆14Sep 29, 2020Updated 5 years ago
- Source code of TrojanXD☆14Feb 11, 2022Updated 4 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Mar 18, 2023Updated 3 years ago
- ☆28Sep 10, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆11Mar 25, 2023Updated 3 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆28Aug 24, 2023Updated 2 years ago
- vidy007's dotfiles☆11Jan 21, 2025Updated last year
- A curated list of tools for incident response☆14Jan 22, 2024Updated 2 years ago
- A great tool for Distributive Denial of Service attack using our botnet that is completely free.☆11Oct 29, 2019Updated 6 years ago
- A simple and fast reverse proxy for Minecraft☆11Feb 15, 2022Updated 4 years ago
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methods☆32Aug 4, 2022Updated 3 years ago
- Obfuscator HTML☆10Oct 16, 2016Updated 9 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Sep 15, 2024Updated last year
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Dec 17, 2020Updated 5 years ago
- Implementation of eBWT using Prefix-free parse (PFP)☆14Jul 14, 2025Updated 9 months ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆29Jan 19, 2023Updated 3 years ago
- JNI-AntiDump/Debugging☆22Sep 11, 2025Updated 7 months ago
- License server and client system.☆10Oct 20, 2021Updated 4 years ago
- TCP/UDP transparent proxy with predefined bypass address set, using nftables `tproxy` target.☆14Oct 7, 2021Updated 4 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated last year
- Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.☆20Jul 3, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Jul 5, 2022Updated 3 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆39Jul 28, 2022Updated 3 years ago
- Bukkit plugin to show the health.☆16Dec 14, 2018Updated 7 years ago
- Minter Link☆16Feb 10, 2022Updated 4 years ago
- Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to "glitch" a target device into a privileged open state.☆30Sep 2, 2021Updated 4 years ago
- I know! Word in the DDoS community this Mortem botnet isn't as scary as it seems. You feel more powerful as you scroll around the methods…☆52Mar 17, 2023Updated 3 years ago
- Escrow Fintech Application For Web, Android & iOS☆14Jul 28, 2024Updated last year