A python based Bot Net Framework
☆42Aug 14, 2025Updated 8 months ago
Alternatives and similar repositories for SquidNet
Users that are interested in SquidNet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC of GITHUB simple C2 in rust☆54Jul 27, 2025Updated 8 months ago
- make virus without coding☆12Apr 7, 2020Updated 6 years ago
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆62Mar 1, 2026Updated last month
- A feed of malware samples curated from threat intelligence sources.☆28Oct 6, 2023Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Sep 11, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 7 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Cobalt Strike 插件包,超级缝合怪...☆11Jul 11, 2025Updated 9 months ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- (SP)^3: A Simple, Practical, and Safe Packet Spoofing Protocol☆15Mar 13, 2017Updated 9 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 短信轰炸/短信测压/ | 一个健壮免费的python短信轰炸程序,专门炸坏蛋蛋,百万接口,多线程全自动添加有效接口,支持异步协程百万并发,全免费的短信轰炸工具!!高一美术生开发全网首发!!☆11Jul 6, 2022Updated 3 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆23Nov 12, 2024Updated last year
- Source to ResonateII, don't do anything dumb. READ THE README BELOW☆12Feb 27, 2019Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- A collection of interesting and diverse Android malware samples☆35Jun 24, 2023Updated 2 years ago
- 手机号字典生成器V1.3 是一个本地离线工具,可按城市与运营商批量生成手机号字典,并支持单号/批量归属地查询。项目基于本地号段库运行,不依赖在线接口,支持随机或顺序生成、结果排序导出、批量查询文件输入与一键复用上次配置。☆12Updated this week
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A lightweight remote access trojan in Rust☆31Jun 28, 2024Updated last year
- Demise is Golang malware that uses Discord for communication.☆13Oct 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Mario takes over your computer !!!!☆14Jun 24, 2022Updated 3 years ago
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 6 months ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- ☆16Mar 29, 2026Updated 2 weeks ago
- ☆36Apr 3, 2023Updated 3 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- HTTP-BROWSER layer 7 attack method bypassing Cloudflare JS Challenges and HTTP-DDOS ruleset.☆11Jan 30, 2024Updated 2 years ago
- service location protocol amplified denial of service attack verification tool☆16Apr 25, 2023Updated 2 years ago
- PoC Bypass Chrome Cookies App-Bound Encryption v20☆11Apr 9, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Golang Botnet That Focuses On Network Stressing v3☆15Mar 27, 2026Updated 2 weeks ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆21Apr 19, 2024Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆63Apr 4, 2026Updated last week
- ☆13Feb 29, 2020Updated 6 years ago
- ☆39Feb 26, 2025Updated last year