macabeus / ipfsbot
A simple example of botnet using IPFS and IPNS protocols as way for controller of botnet
☆15Updated 6 years ago
Alternatives and similar repositories for ipfsbot:
Users that are interested in ipfsbot are comparing it to the libraries listed below
- A proof of concept P2P botnet written in Python using the Twisted framework☆49Updated 6 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Updated 6 years ago
- I reworked the Go Windows Backdoor to use AES encryption.☆18Updated 7 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆45Updated 3 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆122Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- Exploit framework written in Go☆28Updated 7 years ago
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Updated 7 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated 2 years ago
- An ARP Poisoning Defender script☆42Updated 6 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆14Updated 5 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- TOR Mail encrypted server for Hidden Services☆40Updated 8 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 6 years ago
- A Completely Distributed Botnet written in Go - DEPRECATED☆12Updated 8 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆73Updated 6 years ago
- A simple bash based metasploit automation tool!☆121Updated 2 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- Code examples from recent blog posts by minerva labs.☆45Updated 6 years ago
- IoT device scanner.☆39Updated 5 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Remote agent used for processing distributed jobs☆15Updated 3 years ago