macabeus / ipfsbot
A simple example of botnet using IPFS and IPNS protocols as way for controller of botnet
☆15Updated 6 years ago
Alternatives and similar repositories for ipfsbot:
Users that are interested in ipfsbot are comparing it to the libraries listed below
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆47Updated 5 years ago
- A proof of concept P2P botnet written in Python using the Twisted framework☆49Updated 6 years ago
- print() to Slack!☆12Updated 7 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆101Updated 3 years ago
- I reworked the Go Windows Backdoor to use AES encryption.☆18Updated 7 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated last year
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆122Updated 7 years ago
- Spark MLib Training Models for Network Security☆16Updated 6 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Updated 6 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆33Updated 6 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- A simple, extensible C&C beaconing system.☆98Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆72Updated 6 years ago
- Simple Mega.co.nz Account Bruteforce Tool☆12Updated 7 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆66Updated 6 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆14Updated 5 years ago
- IoT device scanner.☆39Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆327Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆148Updated 6 years ago
- Go-deliver is a payload delivery tool coded in Go.☆116Updated 6 years ago
- ssh public host key scanner using shodan☆117Updated 5 years ago
- An ARP Poisoning Defender script☆42Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆101Updated 6 years ago
- Code examples from recent blog posts by minerva labs.☆45Updated 6 years ago