mal-project / iworm.Darknet
Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly
☆35Updated 11 years ago
Alternatives and similar repositories for iworm.Darknet:
Users that are interested in iworm.Darknet are comparing it to the libraries listed below
- PoC Android smart phone botnet☆78Updated 12 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Mutation Of Vıruses☆50Updated 9 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆29Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 7 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago
- botnet scanner written in python☆8Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆21Updated 8 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆12Updated 6 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- HTTP BOTNET☆8Updated last year
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- (In Progress) aims to develop an environment capable to simulate Botnet P2P Zeus,☆9Updated 10 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆28Updated 9 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 6 years ago