lejolly / miraiLinks
The Mirai malware modified for use on NCL/a virtual/simulated environment.
☆46Updated 2 years ago
Alternatives and similar repositories for mirai
Users that are interested in mirai are comparing it to the libraries listed below
Sorting:
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆98Updated 7 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆145Updated 6 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- A next generation of ransomware. Fully written using a .Net Framework + C&C System☆41Updated 9 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆32Updated 7 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- The Open Tor Botnet (ZIB)☆33Updated 10 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆33Updated 8 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆41Updated 8 years ago
- Demonstrate about file-less malware approach using JavaScript☆55Updated 8 years ago
- Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malw…☆92Updated last year
- Build a Mirai botnet from the source code.☆42Updated 6 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆173Updated 8 years ago
- HTTP botnet☆62Updated 9 years ago
- IRC based botnet developed in C☆44Updated 8 years ago
- Panel for the HTTP botnet UBoat - https://github.com/UBoat-Botnet/UBoat/☆113Updated 4 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆77Updated 2 years ago
- Dangerous Malwares☆211Updated 8 years ago
- Conti Ransomware Source Code☆19Updated 3 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Community driven computer worm☆69Updated 3 years ago
- Simple python malware for back connect in windows☆58Updated 7 years ago
- A Linux Cyptomining malware☆37Updated 2 years ago
- ☆53Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- enemy SSH Telnet IoT botnet☆60Updated 3 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆86Updated 8 years ago