kulukami / Build-a-Mirai-botnetView external linksLinks
Build a Mirai botnet from the source code.
☆43Jul 23, 2019Updated 6 years ago
Alternatives and similar repositories for Build-a-Mirai-botnet
Users that are interested in Build-a-Mirai-botnet are comparing it to the libraries listed below
Sorting:
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 7 months ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- People have been wanting this Mirai Botnet for awhile now. The Joker Mirai V1 developed by IoTNet himself. This powerful botnet has the b…☆139Mar 17, 2023Updated 2 years ago
- An archive of BASHLITE source code☆11Oct 29, 2016Updated 9 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- Satori botnet variant☆13Mar 19, 2022Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Feb 21, 2023Updated 2 years ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 2 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15May 13, 2019Updated 6 years ago
- Running mirai botnet in lab environment☆10Apr 9, 2017Updated 8 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- ☆13Sep 15, 2018Updated 7 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated last year
- Collect computer related materials and codes☆20Jan 16, 2026Updated 3 weeks ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆43Mar 18, 2015Updated 10 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- ☆25Apr 28, 2024Updated last year
- ☆27Jul 21, 2020Updated 5 years ago
- ☆29May 10, 2024Updated last year
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆28Aug 24, 2023Updated 2 years ago
- Realistic Data Generation tool for Big Data Appliances and AI Solutions☆13Dec 16, 2022Updated 3 years ago
- Simple Google Chrome stealer, sends passwords via Telegram into private channel☆47Jun 12, 2018Updated 7 years ago
- Collection about PoC for sql injection on Joomla☆32Dec 22, 2020Updated 5 years ago
- webpwn3r ======== WebPwn3r - Web Applications Security Scanner. By Ebrahim Hegazy - @Zigoo0 Thanks: @lnxg33k, @dia2diab @Aelhemily, @o…☆28Jan 11, 2019Updated 7 years ago
- Decentralised P2P botnet using toxcore.☆179Updated this week
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated last month
- The plan is to have a replacement for psexec☆32Aug 15, 2018Updated 7 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆76Jun 18, 2021Updated 4 years ago
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated 11 months ago
- Fofa数据抓取工具-UI版☆13Mar 24, 2024Updated last year