Worm implemented in Python
☆87Apr 14, 2016Updated 9 years ago
Alternatives and similar repositories for Worm
Users that are interested in Worm are comparing it to the libraries listed below
Sorting:
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆528Oct 5, 2022Updated 3 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆22Nov 12, 2016Updated 9 years ago
- Botnet IRC C&C Created in python language, developed for language learning☆11May 26, 2016Updated 9 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Simple python malware for back connect in windows☆59Apr 24, 2018Updated 7 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Mar 13, 2017Updated 8 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆76Jun 18, 2021Updated 4 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Jul 4, 2017Updated 8 years ago
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆16Aug 17, 2015Updated 10 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31May 22, 2017Updated 8 years ago
- DNS Botnet Server and Client☆34Aug 28, 2025Updated 6 months ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- Metasploit Framework☆19Apr 6, 2020Updated 5 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Educational botnet program to perform a DDoS attack☆186Dec 24, 2016Updated 9 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- This is a plugin for the c# R.A.T server providing extension to android based phone systems☆20Mar 2, 2018Updated 8 years ago
- Trojans/Viruses/Worms/Rootkits Source Code Repository☆21Nov 7, 2015Updated 10 years ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Python Pentest Tools☆22Dec 22, 2025Updated 2 months ago
- Stealth Kid RAT (SKR) is an open-source multi-platform Remote Access Trojan (RAT) written in C#. Released under MIT license. The SKR proj…☆23Sep 16, 2021Updated 4 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆24Mar 2, 2018Updated 8 years ago
- Mirai Botnet DB Project☆26Mar 20, 2019Updated 6 years ago
- Files for my Python3 Create Your Own Tool Series☆25Jul 21, 2022Updated 3 years ago
- Telnet Honeypot☆163Mar 5, 2019Updated 7 years ago
- Python based Remote Administration Tool(RAT)☆92May 25, 2020Updated 5 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- A simple Node.js virus to demonstrate how digital viral infection works☆112Jan 24, 2014Updated 12 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Jan 1, 2021Updated 5 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago