lkorth / botnet-detectionLinks
A network analysis algorithm for detecting bots on large networks.
☆20Updated 12 years ago
Alternatives and similar repositories for botnet-detection
Users that are interested in botnet-detection are comparing it to the libraries listed below
Sorting:
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆31Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Download exploits from exploit-db.com☆43Updated 10 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- IP Address Listing Tool☆12Updated 11 years ago
- Hacking environment installation scripts for OS X☆27Updated 3 years ago
- python web scraping☆9Updated 10 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- Some helper tools for network pentest☆19Updated 11 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Network Guardian☆12Updated 8 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- Educational Python penetration testing framework☆9Updated 7 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago