shipcod3 / IRC-Bot-HuntersLinks
a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE
☆78Updated 2 years ago
Alternatives and similar repositories for IRC-Bot-Hunters
Users that are interested in IRC-Bot-Hunters are comparing it to the libraries listed below
Sorting:
- Upgrade your netcat shell today!☆60Updated 7 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆41Updated 8 years ago
- PHP root (suid) reverse shell☆73Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- ☆31Updated 5 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated 4 months ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆70Updated 5 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆36Updated 12 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- OpenSource cross-platform python security toolkit (remote shell)☆45Updated 2 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆86Updated last year
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- Splunk Web Shell☆51Updated 10 years ago
- Сollection of TCL scripts for Cisco IOS penetration testing☆64Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆79Updated 8 years ago
- ☆88Updated 6 years ago