kevthehermit / dc-toolkitLinks
Python tools for interacting with a DarkComet Client
☆54Updated 10 years ago
Alternatives and similar repositories for dc-toolkit
Users that are interested in dc-toolkit are comparing it to the libraries listed below
Sorting:
- A short and small memory forensics helper.☆52Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆90Updated 7 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 10 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 4 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- ☆74Updated 3 years ago
- A warehouse for your malware☆133Updated 12 years ago
- Collection of my Python Scripts☆41Updated 5 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 8 years ago
- Malware management program and tools☆26Updated 9 years ago
- ☆85Updated 10 years ago
- ☆68Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆129Updated 12 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Updated 11 years ago
- ~ BannerGrab☆25Updated 9 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- WeakNet PHP Execution Shell☆31Updated 10 years ago
- Malware.lu tools☆63Updated 12 years ago