mal-project / iworm.Darknet
Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly
☆35Updated 11 years ago
Alternatives and similar repositories for iworm.Darknet:
Users that are interested in iworm.Darknet are comparing it to the libraries listed below
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆28Updated 9 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- [BASH] Password generator through a wordlist☆12Updated 11 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- PoC Android smart phone botnet☆77Updated 12 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆25Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆42Updated 7 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 9 years ago