A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!
☆41Jun 19, 2017Updated 8 years ago
Alternatives and similar repositories for ziggystartux
Users that are interested in ziggystartux are comparing it to the libraries listed below
Sorting:
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆20Jan 11, 2025Updated last year
- ☆12Jul 15, 2018Updated 7 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 3 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆94Jul 13, 2017Updated 8 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Normalized network traffic entropy-based DDoS detection in P4☆13May 9, 2024Updated last year
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆38Feb 18, 2019Updated 7 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Jan 7, 2025Updated last year
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- Connect to a GitHub Action runner via SSH through an ngrok tunnel.☆15Dec 5, 2024Updated last year
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆15Sep 29, 2020Updated 5 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- ircflu is an IRC bot written in Go☆19Oct 23, 2020Updated 5 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- ☆16May 6, 2015Updated 10 years ago
- HL7 / FHIR honeypot☆26May 20, 2024Updated last year
- IRC based botnet developed in C☆43Jul 11, 2017Updated 8 years ago
- Windows OpenStack Heat templates☆14Apr 15, 2014Updated 11 years ago
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 3 months ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- ☆13Jun 10, 2023Updated 2 years ago
- CNC botnet developed via C☆17Dec 2, 2016Updated 9 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆29Jan 30, 2023Updated 3 years ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆185Oct 6, 2016Updated 9 years ago
- A simple multithreaded SSH credential tester.☆14Jun 6, 2025Updated 9 months ago
- Simple storage for stock prices with adjusted prices calculation based on Center for Research in Security Prices (CRSP) standards☆12Feb 15, 2018Updated 8 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago