moloch-- / Yoshimi-BotnetLinks
PoC Android smart phone botnet
☆79Updated 13 years ago
Alternatives and similar repositories for Yoshimi-Botnet
Users that are interested in Yoshimi-Botnet are comparing it to the libraries listed below
Sorting:
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- A ctypes powered python keylogger.☆107Updated 6 years ago
- Better Remote Access Trojan☆51Updated 9 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- This tool creates almost undetectabe trojan virus to exploit windows machine.☆135Updated 8 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆39Updated 10 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆51Updated 8 years ago
- Show info about the author by facebook photo url☆40Updated 8 years ago
- Capstone: Keylogger Trojan☆34Updated 7 years ago
- Wi-Fi Backdoors☆42Updated 10 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 9 years ago
- Simple security surveillance script for linux distributions.☆59Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 10 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆57Updated 10 years ago
- Archive of leaked Equation Group materials☆17Updated 9 years ago
- Mutation Of Vıruses☆48Updated 10 years ago
- Miscellaneous exploit code☆21Updated 9 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- Password cracking utility☆54Updated 4 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31Updated 8 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 10 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 9 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 5 years ago