Python tools for interacting with a DarkComet Client
☆54Aug 4, 2015Updated 10 years ago
Alternatives and similar repositories for dc-toolkit
Users that are interested in dc-toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Volatility Plugins☆22May 1, 2015Updated 11 years ago
- Fake msxfs.dll to debug ATM trojans☆56Sep 28, 2015Updated 10 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆79Feb 8, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- ☆18Feb 4, 2014Updated 12 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Jul 2, 2020Updated 5 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- DarkAgent Remote Administration Tool RAT by DragonHunter☆141Apr 15, 2013Updated 13 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Twitter bots, IRC bots, bots that make other bots. The world of bots is limitless.☆19Sep 24, 2016Updated 9 years ago
- Zeus Gameover reverse engineering work☆16Feb 11, 2014Updated 12 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- The Horrific Omnipotent Rootkit☆24Mar 17, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- ZeroAccess v3 toolkit☆167Dec 18, 2017Updated 8 years ago
- Metasploit Framework☆11Sep 5, 2017Updated 8 years ago
- Ring3 Rootkit Backdoor.☆42Jul 20, 2015Updated 10 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 8 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Python Web App to Parse and Track Email and http Pcap Files.☆54Jul 14, 2013Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Malware exploits☆560Aug 22, 2025Updated 8 months ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- Python Decoders for Common Remote Access Trojans☆1,118Jul 16, 2024Updated last year
- Windows Malware☆39Apr 17, 2013Updated 13 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Mar 5, 2023Updated 3 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago