Distributed File Storage Using JavaScript Botnets
☆112Aug 16, 2013Updated 12 years ago
Alternatives and similar repositories for HiveMind
Users that are interested in HiveMind are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Apr 20, 2014Updated 12 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆36Aug 20, 2013Updated 12 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 4 years ago
- complex webshell manager, quasi-http botnet.☆283Feb 2, 2015Updated 11 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- Power Loader botnet☆38Feb 25, 2015Updated 11 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Batch NetWork Worm with Download & Execute Payload☆10May 26, 2020Updated 5 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- A Remote Administration Tool coded in C#☆19Jul 5, 2012Updated 13 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 12 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 12 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 11 years ago
- generates an encrypted reverse tcp tunnel implementation in php☆19Oct 22, 2012Updated 13 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OS X rootkit loader version #1☆18Apr 10, 2015Updated 11 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- ☆11Jul 15, 2024Updated last year
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆18Jan 29, 2012Updated 14 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- The defuse.ca pastebin.☆23Jan 16, 2019Updated 7 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- RCS Agent for Linux☆107Jul 6, 2015Updated 10 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆46Jan 19, 2018Updated 8 years ago
- Totally anonymous botnet client with an emphasis on individual zombie control, resiliency of the host machine, and ease of remote code ex…☆17Jan 25, 2023Updated 3 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Apr 20, 2022Updated 4 years ago