shipcod3 / IRC-Bot-Hunters
a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE
☆78Updated 2 years ago
Alternatives and similar repositories for IRC-Bot-Hunters
Users that are interested in IRC-Bot-Hunters are comparing it to the libraries listed below
Sorting:
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆40Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- ☆65Updated 8 years ago
- Upgrade your netcat shell today!☆60Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- Linux v4.x.x Rootkit☆90Updated 9 months ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- ☆31Updated 5 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆36Updated 11 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Mimipenguin密码抓取神器☆26Updated 7 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated 3 months ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Resurrecting and updating the best log cleaner☆31Updated 10 years ago
- Operational toolset utilizing git's submodule feature☆57Updated 12 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 9 years ago
- PHP root (suid) reverse shell☆73Updated 7 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- public exploits☆35Updated 2 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆70Updated 5 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 6 years ago
- Joomla Vulnerability Component Scanner☆60Updated 6 years ago
- ☆22Updated 8 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆78Updated 7 years ago
- Some useful tools and scripts☆45Updated 2 years ago
- Small Backdoor/rootkit for linux kernel☆21Updated 11 years ago