shipcod3 / IRC-Bot-HuntersLinks
a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE
☆78Updated 2 years ago
Alternatives and similar repositories for IRC-Bot-Hunters
Users that are interested in IRC-Bot-Hunters are comparing it to the libraries listed below
Sorting:
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆41Updated 8 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37Updated 12 years ago
- DNS Botnet Server and Client☆34Updated 2 months ago
- ☆65Updated 8 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- Upgrade your netcat shell today!☆58Updated 8 years ago
- simple shellcode generator☆114Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆120Updated 7 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Updated 12 years ago
- Cronbased Dirty Cow Exploit☆30Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- RIG Exploit Kit (front end)☆30Updated 10 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago
- This is a linux rootkit using many of the techniques described on☆167Updated 6 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 6 years ago
- PHP root (suid) reverse shell☆74Updated 8 years ago
- ☆85Updated 10 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆129Updated 12 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆73Updated 5 years ago
- Openssh backdoor found with a ssh honeypot☆27Updated 9 years ago
- A curated list of rootkits found on Github and other sites.☆64Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago