Create a worm that bruteforces SSH and "infect" the system.
☆26Feb 4, 2017Updated 9 years ago
Alternatives and similar repositories for worm-ssh
Users that are interested in worm-ssh are comparing it to the libraries listed below
Sorting:
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Worm implemented in Python☆87Apr 14, 2016Updated 9 years ago
- Batch NetWork Worm with Download & Execute Payload☆12May 26, 2020Updated 5 years ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated last month
- AlMA.PRO.SPY - An open-source Botnet.☆15Jul 25, 2017Updated 8 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- Uses AES to run encrypted shellcode using Python and ctypes☆15Jan 17, 2016Updated 10 years ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- ☆19Apr 30, 2018Updated 7 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆23May 17, 2018Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Mar 13, 2017Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Apr 20, 2014Updated 11 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- Reverse shell generator☆23Oct 3, 2019Updated 6 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- A Linux RAT in C☆33Oct 29, 2018Updated 7 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- Port of Google V8 JavaScript engine to z/OS. The Linux on Z port is maintained in the community: https://chromium.googlesource.com/v8/v8…☆43Feb 20, 2020Updated 6 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- This bot allows you to automate the download process from a page where links to download files are periodically added☆10Dec 16, 2019Updated 6 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆76Jun 18, 2021Updated 4 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Jun 30, 2018Updated 7 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- monerobux modules for sopel irc bot☆11Aug 24, 2021Updated 4 years ago
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 8 years ago
- Python scripts for easy and anonymous cam4 recordings.☆10Mar 18, 2024Updated last year
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- streamlink-cam4 lets you follow and archive your selected models shows on www.cam4.com☆12Sep 18, 2021Updated 4 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- mp4 video download from Vimeo and DailyMotion☆10Apr 4, 2017Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago