mal-project / iworm.DarknetLinks
Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly
☆35Updated 12 years ago
Alternatives and similar repositories for iworm.Darknet
Users that are interested in iworm.Darknet are comparing it to the libraries listed below
Sorting:
- PoC Android smart phone botnet☆79Updated 13 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Mutation Of Vıruses☆49Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 9 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆51Updated 8 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆29Updated 4 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 8 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- Remote Windows shell☆32Updated 11 years ago
- Miscellaneous exploit code☆20Updated 8 years ago
- Capstone: Keylogger Trojan☆35Updated 7 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- Virus RAT v8.0 Beta☆25Updated 8 years ago
- HTTP botnet☆62Updated 9 years ago