laudarch / ShellsploitLinks
Mutation Of Vıruses
☆49Updated 9 years ago
Alternatives and similar repositories for Shellsploit
Users that are interested in Shellsploit are comparing it to the libraries listed below
Sorting:
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆36Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Simple Remote Access Trojan☆24Updated 8 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- Virus RAT v8.0 Beta☆26Updated 8 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- D-RAT SRC Extract☆12Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- Autosploit = Automating Metasploit Modules.☆79Updated 6 years ago
- Malware Dump☆20Updated 8 years ago
- All about the remote administrative tools☆37Updated 10 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆45Updated 7 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- python remote access trojan☆38Updated 8 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Plog - A simple and powerful keylogger !☆11Updated 7 years ago
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40Updated 11 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- FUZZBUNCH - NSA security tools☆78Updated 8 years ago