Botnet using c
☆12Sep 2, 2015Updated 10 years ago
Alternatives and similar repositories for Botnet-using-c
Users that are interested in Botnet-using-c are comparing it to the libraries listed below
Sorting:
- An XNU kernel fuzz tool☆22Mar 3, 2010Updated 16 years ago
- ☆22Apr 16, 2017Updated 8 years ago
- Bot simples para manter acesso em máquinas Windows.☆29Aug 6, 2015Updated 10 years ago
- Botnet IRC C&C Created in python language, developed for language learning☆11May 26, 2016Updated 9 years ago
- Metasploit Framework☆19Apr 6, 2020Updated 5 years ago
- ☆23Dec 16, 2025Updated 3 months ago
- Headers for private frameworks or undocumented interfaces of iPhoneOS.☆15Mar 23, 2011Updated 15 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Jan 15, 2020Updated 6 years ago
- Anti-ransomware in linux, Decoy, Protect file, Protect drectory, Auto backup☆25Feb 12, 2023Updated 3 years ago
- A simple botnet that propagates via TELNET, controlled via IRC server, can execute shell commands and launch DDoS attacks☆16Nov 24, 2017Updated 8 years ago
- Encode all hard code string in objective-c project☆15Mar 5, 2019Updated 7 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- substrate framework for android based on frida☆17May 15, 2020Updated 5 years ago
- Dump Kext information from Macos. Support batch analysis. The disassembly framework used is Capstone☆43Jul 16, 2017Updated 8 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- Syntax and rich editor support for Logos in VS Code☆17Sep 22, 2023Updated 2 years ago
- eda-3 from many years ago☆14Sep 5, 2014Updated 11 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- Android-Syscall-Logger☆22Feb 28, 2021Updated 5 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75May 8, 2018Updated 7 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- ☆19Nov 17, 2019Updated 6 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- eqgrp-auction decrypted☆13Apr 15, 2017Updated 8 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- 🤖 ☠️ 💬 A simple Telegram Bot that controls the victim's computer.☆45Sep 20, 2025Updated 6 months ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- My attempt at predicting Powerball numbers with nodejs☆10Jul 6, 2016Updated 9 years ago
- iPhone AppStore Tweak,AppStore Keybag and all cache file、Junk files cleanup.☆15Dec 20, 2018Updated 7 years ago
- ☆21Jan 15, 2018Updated 8 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- D-RAT [VB.NET]+[MySQL]+[PHP]☆15Jun 10, 2020Updated 5 years ago
- Some concept code for bypassing the Android lock screen from recovery mode☆16Mar 28, 2011Updated 14 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Decrypt Nanocore RAT configuration☆10Mar 11, 2017Updated 9 years ago