jgamblin / Mirai-Source-CodeLinks
Leaked Mirai Source Code for Research/IoC Development Purposes
☆8,953Updated last month
Alternatives and similar repositories for Mirai-Source-Code
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
Sorting:
- Decrypted content of eqgrp-auction-file.tar.xz☆4,170Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,237Updated 3 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,508Updated 4 years ago
- Dirty COW☆3,408Updated 6 years ago
- Python botnet and backdoor☆1,596Updated 2 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,826Updated last year
- Framework for Man-In-The-Middle attacks☆3,623Updated 7 years ago
- Course materials for Malware Analysis by RPISEC☆3,929Updated 3 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,932Updated 8 years ago
- ZMap is a fast single packet network scanner designed for Internet-wide network surveys.☆5,905Updated 2 weeks ago
- ☆3,439Updated 8 months ago
- Automatic SQL injection and database takeover tool☆35,244Updated 2 weeks ago
- SSH man-in-the-middle tool☆1,707Updated 4 years ago
- An advanced memory forensics framework☆7,820Updated 3 months ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,846Updated 3 months ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,229Updated 2 months ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆565Updated 8 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,130Updated 5 years ago
- Automated Mass Exploiter☆5,156Updated 2 years ago
- Hardware backdoors in some x86 CPUs☆2,375Updated 6 years ago
- UNIX-like reverse engineering framework and command-line toolset☆22,218Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,751Updated 5 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,367Updated 4 months ago
- Ettercap Project☆2,577Updated last month
- Firmware Analysis Tool☆12,976Updated 2 weeks ago
- PEDA - Python Exploit Development Assistance for GDB☆6,034Updated last year
- CTF framework and exploit development library☆12,889Updated this week
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,389Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,148Updated last year
- an awesome list of honeypot resources☆9,648Updated 5 months ago