a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE
☆78Mar 5, 2023Updated 3 years ago
Alternatives and similar repositories for IRC-Bot-Hunters
Users that are interested in IRC-Bot-Hunters are comparing it to the libraries listed below
Sorting:
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- BotNet Scanner For Educational Purposes.☆19Mar 7, 2020Updated 6 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Mar 5, 2014Updated 12 years ago
- Hybrid Botnet over TOR targeting Linux machines☆11Aug 1, 2021Updated 4 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- Mirai Botnet DB Project☆26Mar 20, 2019Updated 7 years ago
- Qbot Botnet. Telnet botnet, most powerfull and strong botnet. requirements: 2 linux server.☆185Oct 6, 2016Updated 9 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Mar 17, 2021Updated 5 years ago
- Linux rootkit and detection examples☆32Jan 3, 2016Updated 10 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- Bot simples para manter acesso em máquinas Windows.☆29Aug 6, 2015Updated 10 years ago
- DNS Botnet Server and Client☆34Aug 28, 2025Updated 6 months ago
- Athena Botnet Source Code☆156Sep 25, 2015Updated 10 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆41Jun 19, 2017Updated 8 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆15Sep 29, 2020Updated 5 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- A simple tool to convert the IP to a DWORD IP☆143Jul 29, 2022Updated 3 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Botnet command & control monitor☆204May 23, 2022Updated 3 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- An IRC based tool for testing the capabilities of a botnet.☆143Jun 30, 2020Updated 5 years ago
- Moobot Botnet | Leaked version☆18Jan 11, 2021Updated 5 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75May 8, 2018Updated 7 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago