A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!
☆41Jun 19, 2017Updated 8 years ago
Alternatives and similar repositories for ziggystartux
Users that are interested in ziggystartux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆20Jan 11, 2025Updated last year
- Solana Dex Info for arbitrage bot☆17Sep 6, 2025Updated 7 months ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 3 years ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆26Jul 20, 2016Updated 9 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆17Jan 7, 2025Updated last year
- ☆10Jun 15, 2024Updated last year
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- fork from http://icmpshell.sourceforge.net☆15Nov 26, 2015Updated 10 years ago
- ☆13Sep 15, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆28Feb 13, 2017Updated 9 years ago
- enemy SSH Telnet IoT botnet☆61Apr 28, 2022Updated 3 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆15Sep 29, 2020Updated 5 years ago
- lcx.exe cross-platform version☆12Mar 5, 2016Updated 10 years ago
- Zig peer type resolution at comptime, ported from the compiler source code☆15Jan 6, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- version 0.5.8☆18Jul 13, 2021Updated 4 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- ircflu is an IRC bot written in Go☆19Oct 23, 2020Updated 5 years ago
- ☆16May 6, 2015Updated 10 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- HL7 / FHIR honeypot☆27May 20, 2024Updated last year
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 3 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A CALDERA Plugin Template☆20Jan 7, 2026Updated 3 months ago
- Tools for attacking Computer Use Agents☆28Jan 16, 2026Updated 2 months ago
- Simple storage for stock prices with adjusted prices calculation based on Center for Research in Security Prices (CRSP) standards☆12Feb 15, 2018Updated 8 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆30Jan 30, 2023Updated 3 years ago
- Simple dialogue plugin for Godot☆21May 27, 2023Updated 2 years ago