macabeus / ipfsbotLinks
A simple example of botnet using IPFS and IPNS protocols as way for controller of botnet
☆17Updated 7 years ago
Alternatives and similar repositories for ipfsbot
Users that are interested in ipfsbot are comparing it to the libraries listed below
Sorting:
- A proof of concept P2P botnet written in Python using the Twisted framework☆48Updated 7 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 8 years ago
- A tcp botnet written in golang☆104Updated 6 years ago
- Application to take over mining destination of remote cgminer instances via RPC interface.☆25Updated 9 years ago
- Firecat is a penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network.☆135Updated 10 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Updated 3 years ago
- GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server☆261Updated 8 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆335Updated 6 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Updated 7 years ago
- Pure HTTP and DNS Botnet written in Golang for Windows.☆156Updated 8 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Updated 7 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 9 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- A simple bash based metasploit automation tool!☆125Updated 2 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 7 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 7 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- Capstone: Keylogger Trojan☆34Updated 7 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- War Child denial of service testing suite☆121Updated 8 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 8 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆121Updated 7 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- OpenSource cross-platform python security toolkit (remote shell)☆44Updated 3 years ago