jgamblin / Mirai-Source-Code
Leaked Mirai Source Code for Research/IoC Development Purposes
☆8,656Updated last year
Alternatives and similar repositories for Mirai-Source-Code:
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,160Updated 2 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,754Updated 2 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,299Updated 6 years ago
- Automated Mass Exploiter☆5,071Updated last year
- Dirty COW☆3,370Updated 5 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,573Updated 10 months ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,116Updated 4 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,441Updated 4 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,893Updated 7 years ago
- Decrypted content of eqgrp-auction-file.tar.xz☆4,110Updated 7 years ago
- Framework for Man-In-The-Middle attacks☆3,593Updated 6 years ago
- ☆3,378Updated last month
- Defund the Police.☆12,264Updated 8 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,204Updated this week
- An open-source post-exploitation framework for students, researchers and developers.☆9,078Updated last month
- Exploitation Framework for Embedded Devices☆12,356Updated 3 weeks ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆11,585Updated 8 months ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,502Updated 6 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆3,999Updated 6 months ago
- SSH man-in-the-middle tool☆1,644Updated 3 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,025Updated 5 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,541Updated 5 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆1,957Updated 3 years ago
- LKM Linux rootkit☆2,654Updated 3 years ago
- an awesome list of honeypot resources☆8,908Updated 5 months ago
- Python botnet and backdoor☆1,566Updated last year
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,239Updated 3 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,154Updated 2 months ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆8,810Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,599Updated 4 years ago