macabeus / ipfsbotLinks
A simple example of botnet using IPFS and IPNS protocols as way for controller of botnet
☆15Updated 7 years ago
Alternatives and similar repositories for ipfsbot
Users that are interested in ipfsbot are comparing it to the libraries listed below
Sorting:
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆45Updated 3 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated 2 years ago
- A proof of concept P2P botnet written in Python using the Twisted framework☆49Updated 7 years ago
- Exploit framework written in Go☆29Updated 7 years ago
- I reworked the Go Windows Backdoor to use AES encryption.☆18Updated 7 years ago
- IP camera bruteforcer, 32 bit version☆14Updated 9 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Updated 6 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 7 years ago
- Remote agent used for processing distributed jobs☆15Updated 3 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆330Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆124Updated 7 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 8 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- netcat for onion router☆9Updated 2 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- An attacker oriented library for the Teensy microcontroller.☆11Updated 4 years ago
- a simple reverse connected bot in golang.☆17Updated 2 years ago
- IoT device scanner.☆39Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago