Distributed File Storage Using JavaScript Botnets
☆114Aug 16, 2013Updated 12 years ago
Alternatives and similar repositories for HiveMind
Users that are interested in HiveMind are comparing it to the libraries listed below
Sorting:
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Apr 20, 2014Updated 11 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 4 years ago
- complex webshell manager, quasi-http botnet.☆282Feb 2, 2015Updated 11 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Batch NetWork Worm with Download & Execute Payload☆12May 26, 2020Updated 5 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- A Remote Administration Tool coded in C#☆19Jul 5, 2012Updated 13 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- A command line tool used to find the SnapChat usernames for known or unknown phone numbers☆10Sep 30, 2013Updated 12 years ago
- OS X rootkit loader version #1☆18Apr 10, 2015Updated 10 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- ☆11Jul 15, 2024Updated last year
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Dec 9, 2017Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- The defuse.ca pastebin.☆23Jan 16, 2019Updated 7 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- Totally anonymous botnet client with an emphasis on individual zombie control, resiliency of the host machine, and ease of remote code ex…☆18Jan 25, 2023Updated 3 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Apr 20, 2022Updated 3 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30May 20, 2021Updated 4 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 7 years ago
- ☆21May 10, 2017Updated 8 years ago
- MIRAI botnet in python3☆20Jun 18, 2019Updated 6 years ago