A resilient peer-to-peer botnet agent in .NET
☆73Apr 5, 2017Updated 9 years ago
Alternatives and similar repositories for vinchuca
Users that are interested in vinchuca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Botnet (Zombie Networks) with C# and Web Socket☆15Jul 8, 2014Updated 11 years ago
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆16Aug 17, 2015Updated 10 years ago
- An fully asynchronous .Net HTTP proxy focused on performance☆24Nov 26, 2018Updated 7 years ago
- A C# irc bot malware POC.☆12Jul 29, 2014Updated 11 years ago
- .Net Mail Server based on Lumisoft opensource project☆14Jul 27, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A P2P library to create peer-to-peer applications with .Net☆69Dec 22, 2014Updated 11 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30May 20, 2021Updated 4 years ago
- An open-source, centralized HTTPS botnet☆175Dec 10, 2022Updated 3 years ago
- Create and validate Merkle trees and receipts in a format consistent with the chainpoint v2 standard.☆14Sep 11, 2019Updated 6 years ago
- C# dictionary that implements a Robin Hood hash table with backwards shifting deletion☆15Sep 5, 2016Updated 9 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- ☆14Aug 30, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An implementation of RFC 8484 - DNS Queries over HTTPS (DoH).☆41Jul 9, 2023Updated 2 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- C# code to run shellcode in a sneaky way☆93Oct 2, 2020Updated 5 years ago
- Athena Botnet Source Code☆156Sep 25, 2015Updated 10 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆59Jun 26, 2015Updated 10 years ago
- A chat application that can ecnrypt messages with remote user's public Key and decrypt messages with local user's private Key☆11Jan 14, 2020Updated 6 years ago
- A simple and easy to use JS Botnet☆97Feb 20, 2022Updated 4 years ago
- Simple Haskell simulation to determine best interval to invest in ETF's☆12Jun 13, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Managed Implementation of Zlib for .NET☆21Sep 4, 2023Updated 2 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆24Mar 2, 2018Updated 8 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- VNC_Proxy / Repeater☆20Oct 14, 2014Updated 11 years ago
- An open-source, centralized HTTPS botnet☆79Apr 11, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Mac address changer every n` seconds☆12May 26, 2020Updated 5 years ago
- Portable Python - No Installation Required!☆20Dec 4, 2019Updated 6 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆60Feb 10, 2017Updated 9 years ago
- ☣️ Simple Master Boot Record (MBR) override example☆15Jul 22, 2017Updated 8 years ago