kulukami / Build-a-Mirai-botnetLinks
Build a Mirai botnet from the source code.
☆43Updated 6 years ago
Alternatives and similar repositories for Build-a-Mirai-botnet
Users that are interested in Build-a-Mirai-botnet are comparing it to the libraries listed below
Sorting:
- ☆37Updated 3 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆98Updated 7 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆73Updated 4 years ago
- enemy SSH Telnet IoT botnet☆60Updated 3 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 4 years ago
- recover Firefox and more browsers logins☆48Updated 3 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆114Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆146Updated 6 years ago
- Cross-platform RAT, written in C☆88Updated 3 years ago
- Exploit Pack - Project☆70Updated 5 years ago
- A fast, lightweight botnet written in pure C.☆40Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- Discord as a C2☆49Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- ☆40Updated 7 years ago
- Carbanak leaked source☆75Updated 7 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆47Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 5 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Injectra injects shellcode payloads into MacOS applications and package installers.☆44Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Malicious DLL (Reverse Shell) generator for DLL Hijacking☆42Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago