i-am-unbekannt / AXIS
AXIS Botnet
☆15Updated 8 months ago
Alternatives and similar repositories for AXIS:
Users that are interested in AXIS are comparing it to the libraries listed below
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆15Updated 5 years ago
- An ADB-based botnet written in C.☆41Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Stealph-botnet its a simpel botnet i code this for fun☆26Updated 4 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- Teardroid v4 Botnet API☆60Updated last year
- Extended Bitcoin Clipper from Nyan Cat☆30Updated 4 years ago
- ☆25Updated 2 years ago
- Ro3b - Advance Banking HTTP Botnet☆49Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆23Updated last year
- A simple script to obfuscate batch(bat) code easily☆22Updated last year
- phishing paypal ,French, English☆24Updated 3 years ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆25Updated 2 years ago
- +300 TOOLS in 1! IN ITALIANO☆12Updated 2 years ago
- This Script will get victims exact location by some phishing method..Here is the demo site☆36Updated 2 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆21Updated 2 years ago
- THANKS YOU FOR CODE | credit NixWasHere/NixC2☆49Updated 9 months ago
- A builder for BatchStealer☆22Updated 2 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆11Updated 2 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 3 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆16Updated 2 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated last year
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆32Updated 4 years ago
- Hax is a mini-tool with really useful hacking tools.☆17Updated last year
- proxphish is a advanced phishing tool☆16Updated 4 years ago
- Katana Botnet used for DDoS attacks based on the Mirai Botnet. TEACHING PURPOSES ONLY! I CANNOT BE HELD RESPONSIBLE FOR ANYTHING YOU DO W…☆46Updated 2 years ago
- Anubis 7.0☆25Updated 4 months ago
- Reverse shell written on python3☆60Updated 4 years ago