kulukami / Build-a-Mirai-botnetLinks
Build a Mirai botnet from the source code.
☆42Updated 5 years ago
Alternatives and similar repositories for Build-a-Mirai-botnet
Users that are interested in Build-a-Mirai-botnet are comparing it to the libraries listed below
Sorting:
- ☆36Updated 3 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆94Updated 7 years ago
- enemy SSH Telnet IoT botnet☆61Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆99Updated 4 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆72Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Javascript Botnet☆23Updated 6 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆127Updated 3 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated last month
- ☆41Updated 7 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Satori botnet variant☆11Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- A Linux RAT in C☆33Updated 6 years ago
- Collaborative malware exchange repository.☆34Updated 6 months ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆50Updated 3 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆19Updated 5 years ago
- Repository of tools used in my blog☆51Updated last year
- Basic Dart reverse shell code☆21Updated last year
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- Linux x86_64 Process Injection Utility☆59Updated 4 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago