shipcod3 / IRC-Bot-HuntersLinks
a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE
☆78Updated 2 years ago
Alternatives and similar repositories for IRC-Bot-Hunters
Users that are interested in IRC-Bot-Hunters are comparing it to the libraries listed below
Sorting:
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆40Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Upgrade your netcat shell today!☆60Updated 7 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated 3 months ago
- PHP root (suid) reverse shell☆73Updated 7 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆79Updated 8 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- ☆31Updated 5 years ago
- unix wildcard attacks☆133Updated 7 years ago
- ☆65Updated 8 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆149Updated 6 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆36Updated 12 years ago
- PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)☆269Updated 7 years ago
- linux rootkit☆160Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- Resurrecting and updating the best log cleaner☆31Updated 10 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 8 years ago
- Mimipenguin密码抓取神器☆26Updated 7 years ago
- some pocs for antivirus evasion☆131Updated last year
- public exploits☆35Updated 2 years ago
- A weaponized version of CVE-2018-9206☆62Updated 6 years ago