kernelzeroday / pbn
Peer to Peer botnet
☆12Updated 4 years ago
Alternatives and similar repositories for pbn:
Users that are interested in pbn are comparing it to the libraries listed below
- Modular rootkit framework.☆27Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- execute a PE in the address space of another PE aka process hollowing☆55Updated 3 years ago
- Pure Go rewrite of knockknock☆10Updated 2 years ago
- Load a DLL from memory☆32Updated 3 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆100Updated 2 years ago
- Shellcode library as a Go package☆70Updated 5 years ago
- Polymorphic ELF Virus☆16Updated 3 years ago
- Golang ransomware☆45Updated 4 years ago
- The RustRAT client, server and payloads to be executed.☆26Updated 3 years ago
- Small Rust programs that do weird things☆30Updated 3 years ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆141Updated 4 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50Updated 2 years ago
- Process injection techniques written in Go.☆62Updated last year
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆198Updated 9 months ago
- PE Crypter written in Nim☆98Updated 4 years ago
- Decentralised P2P botnet using toxcore.☆172Updated 2 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Updated 2 years ago
- Simple reverse and bind shells written in Go.☆31Updated 2 years ago
- ☆134Updated last month
- Self-healing RAT utilizing libp2p☆88Updated 4 years ago
- Allow a Go process to dynamically load .NET assemblies☆148Updated 5 years ago
- A go library for using the I2P Simple Anonymous Messaging (SAM version 3.2) bridge☆17Updated 5 months ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆40Updated 7 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆30Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- My little precious collection of Linux 4.x kernel rootkits☆26Updated 8 months ago
- Windows UAC bypass techniques implemented and written in Go☆211Updated 3 years ago