mal-project / iworm.DarknetLinks
Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly
☆35Updated 11 years ago
Alternatives and similar repositories for iworm.Darknet
Users that are interested in iworm.Darknet are comparing it to the libraries listed below
Sorting:
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Mutation Of Vıruses☆50Updated 9 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- PoC Android smart phone botnet☆78Updated 12 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Various tools to track the Mirai botnet☆20Updated 8 years ago
- (In Progress) aims to develop an environment capable to simulate Botnet P2P Zeus,☆9Updated 10 years ago
- Power Loader botnet☆39Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API