msOlivers / pyBotnet
Botnet IRC C&C Created in python language, developed for language learning
☆12Updated 8 years ago
Alternatives and similar repositories for pyBotnet:
Users that are interested in pyBotnet are comparing it to the libraries listed below
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆41Updated 3 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- HTTP BOTNET☆8Updated last year
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Bot simples para manter acesso em máquinas Windows.☆28Updated 9 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Telegram BotNet☆36Updated last year
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆33Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- ☆27Updated 8 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Updated 9 years ago
- Seeing how easy it is to create ransomware.☆46Updated 2 years ago
- Simple C# reverse shell with shellcode and process injection☆40Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Updated 3 years ago
- Random stuff☆16Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated 2 months ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- ☆30Updated 8 years ago
- AV Bypass☆29Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- MS17-010☆12Updated 7 years ago
- Remote Windows shell☆31Updated 10 years ago