kulukami / Build-a-Mirai-botnet
Build a Mirai botnet from the source code.
☆40Updated 5 years ago
Alternatives and similar repositories for Build-a-Mirai-botnet:
Users that are interested in Build-a-Mirai-botnet are comparing it to the libraries listed below
- ☆36Updated 3 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- A Linux RAT in C☆32Updated 6 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Updated 5 years ago
- ☆23Updated last year
- Powerful script for logical obfuscation of powershell scripts☆28Updated 6 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆46Updated 2 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- Windows Exploit List☆17Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22Updated 2 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆68Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- Discord as a C2☆49Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆38Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆97Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 5 years ago
- ☆50Updated 4 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆26Updated 4 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- Obfuscates a Python Script and the accompanying Shellcode.☆56Updated 5 years ago