kulukami / Build-a-Mirai-botnetLinks
Build a Mirai botnet from the source code.
☆42Updated 5 years ago
Alternatives and similar repositories for Build-a-Mirai-botnet
Users that are interested in Build-a-Mirai-botnet are comparing it to the libraries listed below
Sorting:
- ☆36Updated 3 years ago
- enemy SSH Telnet IoT botnet☆61Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- ☆41Updated 7 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆127Updated 3 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆94Updated 7 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆40Updated 7 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 3 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆72Updated 3 years ago
- DLInjector for Graphical User Interface.☆35Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆43Updated 3 years ago
- Unpacking tool for the zipExec Crypter☆13Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆67Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆99Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- MBR virus☆22Updated 3 years ago
- Discord as a C2☆49Updated 4 years ago
- Windows Exploit List☆17Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- A fast, lightweight botnet written in pure C.☆36Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago