Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly
☆37Aug 20, 2013Updated 12 years ago
Alternatives and similar repositories for iworm.Darknet
Users that are interested in iworm.Darknet are comparing it to the libraries listed below
Sorting:
- The Open Tor Botnet (ZIB)☆33Aug 14, 2015Updated 10 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- The NSA wants access to your all your data, might as well make it easier for them to access the backend of your WordPress install. When …☆27Nov 2, 2016Updated 9 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- MIRAI botnet in python3☆20Jun 18, 2019Updated 6 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆16Apr 8, 2022Updated 3 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- ☆10Mar 29, 2022Updated 3 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Batch NetWork Worm with Download & Execute Payload☆12May 26, 2020Updated 5 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆15Jun 16, 2017Updated 8 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Aug 21, 2022Updated 3 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet …☆15Sep 28, 2021Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- Qbot Source, Scanners, loaders....☆13Jul 2, 2023Updated 2 years ago
- Bot simples para manter acesso em máquinas Windows.☆29Aug 6, 2015Updated 10 years ago
- Remote Windows shell☆32Jun 22, 2014Updated 11 years ago
- ☆32Apr 4, 2017Updated 8 years ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆183Oct 6, 2016Updated 9 years ago
- Botnet command & control monitor☆203May 23, 2022Updated 3 years ago
- Hybrid Botnet over TOR targeting Linux machines☆11Aug 1, 2021Updated 4 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 4 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago