moloch-- / Yoshimi-Botnet
PoC Android smart phone botnet
☆78Updated 12 years ago
Alternatives and similar repositories for Yoshimi-Botnet:
Users that are interested in Yoshimi-Botnet are comparing it to the libraries listed below
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆28Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Mutation Of Vıruses☆50Updated 9 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆21Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆32Updated 8 years ago
- Post-Exploitation Framework☆75Updated 8 years ago
- iSpy Keylogger☆42Updated 8 years ago
- Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an imag…☆19Updated 10 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆33Updated 8 years ago
- Basic python script for detect airdroid users in lan☆48Updated 4 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 9 years ago
- Better Remote Access Trojan☆48Updated 8 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Phishing webapp generator☆41Updated 6 years ago
- Lightweight Android Remote Administration Tool☆66Updated 11 months ago
- Password cracking utility☆53Updated 3 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago