kulukami / Build-a-Mirai-botnet
Build a Mirai botnet from the source code.
☆38Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Build-a-Mirai-botnet
- ☆35Updated 2 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆86Updated 7 years ago
- enemy SSH Telnet IoT botnet☆58Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆119Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Javascript Botnet☆22Updated 6 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆66Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆46Updated 3 years ago
- 🔅 Reverse shell written on python3☆15Updated 3 years ago
- A simple botnet that propagates via TELNET, controlled via IRC server, can execute shell commands and launch DDoS attacks☆15Updated 6 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆36Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 5 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆48Updated 2 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆22Updated 3 years ago
- Exploit Pack - Project☆68Updated 5 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago
- A semi-automatic osint/recon framework.☆24Updated 5 months ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆78Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Let's try to create a rootkit!☆18Updated 4 years ago
- Moobot Botnet | Leaked version☆14Updated 3 years ago