sX89q / leaksLinks
Compromised SSH servers and scraped websites revealed leaked hacking tools.
☆116Updated 7 months ago
Alternatives and similar repositories for leaks
Users that are interested in leaks are comparing it to the libraries listed below
Sorting:
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆15Updated 5 years ago
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methods☆33Updated 2 years ago
- Exploits | MIRAI AND SCANNERS | Layer4 Methods | Layer7 Methods | UDP METHODS | TCP METHODS | BRUTERS | VULN | LISTS☆66Updated 10 months ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆61Updated 4 years ago
- Nebula C2 - Python☆90Updated 3 months ago
- People have been wanting this Mirai Botnet for awhile now. The Joker Mirai V1 developed by IoTNet himself. This powerful botnet has the b…☆116Updated 2 years ago
- I know! Word in the DDoS community this Mortem botnet isn't as scary as it seems. You feel more powerful as you scroll around the methods…☆43Updated 2 years ago
- A Windows Botnet written in Golang☆87Updated last year
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆36Updated 2 years ago
- Katana Botnet used for DDoS attacks based on the Mirai Botnet. TEACHING PURPOSES ONLY! I CANNOT BE HELD RESPONSIBLE FOR ANYTHING YOU DO W…☆51Updated 2 years ago
- ☆25Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- An open-source, centralized HTTPS botnet☆73Updated 2 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆127Updated 2 years ago
- layer7 mirai private layer4 ovh bypass nfo bypass☆37Updated 2 years ago
- Free SSH c2 for all to use! the only skill you need is the knowledge to setup mysql and edit json.☆99Updated 3 months ago
- A Linux worm targeting vulnerable IoT devices with MMU. Reengineered from/inspired by Mirai botnet.☆17Updated 2 years ago
- 🚨 Check the asn is able to use for ip header modification or no☆43Updated last month
- 👾- An open-source post-exploitation framework, researchers and developers.☆55Updated last year
- Powerful Discord Stealer written in python☆105Updated 2 years ago
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆54Updated 4 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆186Updated last month
- THANKS YOU FOR CODE | credit NixWasHere/NixC2☆56Updated last month
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆120Updated last year
- Krypton C2 is a simple botnet source. Credits Source Code: NixWasHere☆83Updated last week
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆25Updated 3 years ago
- Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.☆201Updated 2 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆24Updated 2 years ago
- An ADB-based botnet written in C.☆44Updated 3 years ago