The Mirai malware modified for use on NCL/a virtual/simulated environment.
☆48Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for mirai
Users that are interested in mirai are comparing it to the libraries listed below
Sorting:
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Running mirai botnet in lab environment☆10Apr 9, 2017Updated 8 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- A Python Script that prepairs and installs a Raspberry Pi compatiable distro to an SD Card☆16Aug 5, 2012Updated 13 years ago
- Setup mirai botnet. Only for educational purpose!☆111Jul 3, 2024Updated last year
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- An example of using Dynamic Invoke to Inject Shellcode using the Early Bird Method.☆15Dec 14, 2023Updated 2 years ago
- People have been wanting this Mirai Botnet for awhile now. The Joker Mirai V1 developed by IoTNet himself. This powerful botnet has the b…☆139Mar 17, 2023Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆17Dec 23, 2024Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Hides processes from the windows task manager using IAT hooking.☆22Mar 30, 2021Updated 4 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25May 6, 2021Updated 4 years ago
- A cross-platform remote administration tool written in Java☆19Aug 26, 2020Updated 5 years ago
- This script make any windows compatible with RDP connection☆21Jul 28, 2025Updated 7 months ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- ☆27Nov 26, 2024Updated last year
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆28Aug 19, 2024Updated last year
- Polymorph file protector☆43Jun 12, 2019Updated 6 years ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- ☆27Sep 13, 2023Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- $2100 .Exe to .Doc Exploit (Python)☆52Dec 19, 2020Updated 5 years ago
- A basic .NET obfuscator uses dnlib, Modded KoiVM on decryption methods. Not stable for now, works on "crack me" executables.☆28Oct 24, 2021Updated 4 years ago
- ☆70Jan 1, 2026Updated 2 months ago
- ☆28Dec 2, 2021Updated 4 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Dec 24, 2023Updated 2 years ago
- ☆35Dec 21, 2023Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.☆22Sep 1, 2022Updated 3 years ago