Telegram BotNet
☆35Dec 9, 2023Updated 2 years ago
Alternatives and similar repositories for Demoniware
Users that are interested in Demoniware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 2 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Botnet IRC C&C Created in python language, developed for language learning☆11May 26, 2016Updated 9 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- Hack for RUHacks☆19May 27, 2018Updated 7 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- ctypes bindings for libphash to robustly compare media files☆12Dec 28, 2022Updated 3 years ago
- A set of AuToMation scripts for hacking.☆11Jan 5, 2022Updated 4 years ago
- SonicWall VPN-SSL Exploit* using Golang ( * and other targets vulnerable to shellshock ).☆18Feb 11, 2021Updated 5 years ago
- Inspire by Samy Kamkar's "DiffBits" software, except this is written in Python, not Perl.☆14Jul 28, 2021Updated 4 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Hacking your car like in movies☆17Aug 22, 2022Updated 3 years ago
- ☆11May 10, 2017Updated 8 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆16Oct 15, 2016Updated 9 years ago
- Infect a pc with badusb and establish a connection through telegram.☆190Mar 8, 2023Updated 3 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Dec 12, 2024Updated last year
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- malware for ATM☆15Oct 25, 2017Updated 8 years ago
- Life OpSec Guide on how to stay more anonymous, private, and secure in life. Take greater procatuations, and quit being tracked and mass …☆14Oct 20, 2022Updated 3 years ago
- IRC based botnet developed in C☆43Jul 11, 2017Updated 8 years ago
- Turn table into subfigure. More or less a hack atm, easy to incorporate to org-mode though☆21Feb 13, 2021Updated 5 years ago
- Android Exploit is an advanced version of rat/payload/botnet and can hack an android device in less than 1 minute and can control multipl…☆13May 8, 2022Updated 3 years ago
- PPPoAT - PPP over Any Transport☆22Apr 21, 2021Updated 4 years ago
- A custom Android spyware made with love.☆16Apr 20, 2018Updated 7 years ago
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- The source code of the Zeus Evolution botnet that used TOR.☆60Feb 10, 2017Updated 9 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago