Botnet IRC C&C Created in python language, developed for language learning
☆11May 26, 2016Updated 9 years ago
Alternatives and similar repositories for pyBotnet
Users that are interested in pyBotnet are comparing it to the libraries listed below
Sorting:
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Python botnet☆12Aug 15, 2015Updated 10 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75May 8, 2018Updated 7 years ago
- Telegram BotNet☆35Dec 9, 2023Updated 2 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- An unfinished project. HTTP botnet coded in VB.net and PHP.☆16Aug 17, 2015Updated 10 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- Website for draco, the OverTheWire warzone☆12Sep 7, 2015Updated 10 years ago
- Location service☆23Feb 13, 2026Updated last month
- 计算机病毒与免疫系统☆13Jul 18, 2014Updated 11 years ago
- 最近出現在影印店的病毒,會請大家幫忙挖礦 XD☆13Jun 20, 2016Updated 9 years ago
- C++/C botnet using HTTP C&C☆16Jan 21, 2015Updated 11 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31May 22, 2017Updated 8 years ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Mar 22, 2017Updated 8 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- How to make a rocket catch a target?☆11Aug 6, 2017Updated 8 years ago
- riusksk's blog:☆17Nov 7, 2022Updated 3 years ago
- A reverse shell cheat-sheet tool☆39Mar 5, 2019Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆24Jun 18, 2018Updated 7 years ago
- A tiny utility to cache function outputs easily☆19May 3, 2025Updated 10 months ago
- Metasploit Framework☆19Apr 6, 2020Updated 5 years ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- DNS Spoof☆31Jun 23, 2020Updated 5 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- ☆32May 9, 2021Updated 4 years ago
- Create a UNIX-like OS from scratch in C/C++ using book//samypesse.github.io/How-to-Make-a-Computer-Operating-System/☆17Sep 20, 2015Updated 10 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- ☆11May 10, 2017Updated 8 years ago
- A Simple ShellcodeLoader☆11Jun 4, 2021Updated 4 years ago
- AI copilot and copywriter for geany-lua☆18Oct 3, 2024Updated last year
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 6 years ago
- A simple botnet that propagates via TELNET, controlled via IRC server, can execute shell commands and launch DDoS attacks☆16Nov 24, 2017Updated 8 years ago