m4pol / fatebot
IRC botnet, that's mainly used to launch denial-of-service attacks.
☆27Updated last year
Alternatives and similar repositories for fatebot:
Users that are interested in fatebot are comparing it to the libraries listed below
- Botnet written in pure Go☆19Updated last year
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆96Updated 2 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆46Updated 2 years ago
- CondiV6 SourceCode Leaked by t.me/iotbotnets Thanks for the leak!☆13Updated last year
- A fast, lightweight botnet written in pure C.☆34Updated 3 years ago
- layer7 mirai private layer4 ovh bypass nfo bypass☆32Updated 2 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆15Updated 5 years ago
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methods☆33Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆51Updated last year
- A Linux worm targeting vulnerable IoT devices with MMU. Reengineered from/inspired by Mirai botnet.☆18Updated 2 years ago
- A Windows Botnet written in Golang☆82Updated last year
- Moobot Botnet | Leaked version☆16Updated 4 years ago
- Create a malicious pip package (PoC)☆11Updated last year
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆23Updated 2 years ago
- THANKS YOU FOR CODE | credit NixWasHere/NixC2☆52Updated 11 months ago
- Katana Botnet used for DDoS attacks based on the Mirai Botnet. TEACHING PURPOSES ONLY! I CANNOT BE HELD RESPONSIBLE FOR ANYTHING YOU DO W…☆49Updated 2 years ago
- The best telnet bruter for the moment, please use it for educational purpose☆20Updated 2 years ago
- Official leak of source code titan stealer (whole). Includes server + client parts and admin panel. Written in C# (.NET) with library au…☆19Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆104Updated last year
- enemy SSH Telnet IoT botnet☆60Updated 2 years ago
- A bots loader for CVE-2022-29464 with multithreading☆10Updated 2 years ago
- Exploits | MIRAI AND SCANNERS | Layer4 Methods | Layer7 Methods | UDP METHODS | TCP METHODS | BRUTERS | VULN | LISTS☆65Updated 8 months ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆31Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- Reworking Mirai with Decentralized Botnet architecture☆30Updated 9 months ago
- 🚨 Check the asn is able to use for ip header modification or no☆42Updated 2 months ago
- An ADB-based botnet written in C.☆44Updated 2 years ago