shipcod3 / IRC-Bot-HuntersLinks
a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE
☆78Updated 2 years ago
Alternatives and similar repositories for IRC-Bot-Hunters
Users that are interested in IRC-Bot-Hunters are comparing it to the libraries listed below
Sorting:
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆41Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated 5 months ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- PHP root (suid) reverse shell☆73Updated 8 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆119Updated 7 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆86Updated 5 years ago
- ☆22Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago
- ☆86Updated 10 years ago
- Upgrade your netcat shell today!☆60Updated 8 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆53Updated 6 years ago
- My own tools for easing the task of pentesting / exploit writing☆49Updated 10 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- simple shellcode generator☆113Updated 8 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆36Updated 12 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- ☆42Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Resurrecting and updating the best log cleaner☆32Updated 10 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 9 years ago
- public exploits☆35Updated 2 years ago