kulukami / Build-a-Mirai-botnetLinks
Build a Mirai botnet from the source code.
☆42Updated 5 years ago
Alternatives and similar repositories for Build-a-Mirai-botnet
Users that are interested in Build-a-Mirai-botnet are comparing it to the libraries listed below
Sorting:
- ☆37Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆128Updated 3 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆96Updated 7 years ago
- enemy SSH Telnet IoT botnet☆61Updated 3 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆72Updated 4 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Updated 3 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Carbanak leaked source☆73Updated 7 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Injectra injects shellcode payloads into MacOS applications and package installers.☆44Updated 4 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆46Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆32Updated 5 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆23Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Javascript Botnet☆23Updated 6 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆182Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Updated 2 years ago