jgamblin / Mirai-Source-Code
Leaked Mirai Source Code for Research/IoC Development Purposes
☆8,690Updated last year
Alternatives and similar repositories for Mirai-Source-Code:
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,616Updated 11 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,617Updated 4 years ago
- A swiss army knife for pentesting networks☆8,617Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆4,063Updated last year
- WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websit…☆8,865Updated this week
- Empire is a PowerShell and Python post-exploitation agent.☆7,558Updated 5 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,189Updated 3 months ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,310Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆13,990Updated this week
- An open-source post-exploitation framework for students, researchers and developers.☆9,114Updated this week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,176Updated 2 weeks ago
- Dirty COW☆3,370Updated 5 years ago
- A little tool to play with Windows security☆19,881Updated 8 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆4,935Updated last month
- Exploitation Framework for Embedded Devices☆12,395Updated last month
- An advanced memory forensics framework☆7,574Updated last year
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,319Updated 6 years ago
- Most advanced XSS scanner.☆13,678Updated 2 weeks ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,172Updated 2 years ago
- A collection of malware samples caught by several honeypots i manage☆1,666Updated 3 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,110Updated 5 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,007Updated this week
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆11,558Updated 4 months ago
- Directory/File, DNS and VHost busting tool written in Go☆11,084Updated this week
- The Browser Exploitation Framework Project☆10,086Updated this week
- Python botnet and backdoor☆1,573Updated 2 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,450Updated 4 years ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆11,658Updated 9 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,234Updated last year
- Web application fuzzer☆6,090Updated 6 months ago