luiscovar / worm-ssh
Create a worm that bruteforces SSH and "infect" the system.
☆26Updated 8 years ago
Alternatives and similar repositories for worm-ssh
Users that are interested in worm-ssh are comparing it to the libraries listed below
Sorting:
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- HTTP botnet☆61Updated 8 years ago
- Miscellaneous exploit code☆19Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 8 years ago
- Small backdoor using cookie.☆60Updated 8 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- this makes your payloads, trojans, viruses fully undetectable☆7Updated 7 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 3 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆75Updated 2 years ago
- Mutation Of Vıruses☆50Updated 9 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- Phishing webapp generator☆41Updated 6 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- ☆19Updated 7 years ago
- ☆24Updated 9 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago