A python based Bot Net Framework
☆43Aug 14, 2025Updated 7 months ago
Alternatives and similar repositories for SquidNet
Users that are interested in SquidNet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC of GITHUB simple C2 in rust☆52Jul 27, 2025Updated 7 months ago
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- forum thread here https://aryion.com/forum/viewtopic.php?f=79&t=43948☆10Jan 16, 2020Updated 6 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Oct 6, 2023Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Sep 11, 2023Updated 2 years ago
- This Remote Access Tool (RAT), built with Go, is controlled via a Discord bot. The bot connects to a target machine and allows remote con…☆11Jun 28, 2025Updated 8 months ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- Cobalt Strike 插件包,超级缝合怪...☆11Jul 11, 2025Updated 8 months ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- By far it is my best and biggest GDI malware I've ever created for educational & entertainment purposes.☆26Nov 7, 2024Updated last year
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- 短信轰炸/短信测压/ | 一个健壮免费的python短信轰炸程序,专门炸坏蛋蛋,百万接口,多线程全自动添加有效接口,支持异步协程百万并发,全免费的短信轰炸工具!!高一美术生开发全网首发!!☆11Jul 6, 2022Updated 3 years ago
- Source to ResonateII, don't do anything dumb. READ THE README BELOW☆12Feb 27, 2019Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Basic CloudFlare bypass JavaScript package using VeNoMouS's Python library.☆14Apr 15, 2024Updated last year
- A collection of interesting and diverse Android malware samples☆35Jun 24, 2023Updated 2 years ago
- 手机号字典生成器:可以根据用户需求定制化生成中国各大运营商和指定区域的手机号字典。☆12Oct 26, 2025Updated 4 months ago
- BitRat Source Code☆42Oct 23, 2020Updated 5 years ago
- Demise is Golang malware that uses Discord for communication.☆13Oct 23, 2024Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A lightweight remote access trojan in Rust☆31Jun 28, 2024Updated last year
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- A simple trojan made for Windows in Python.☆11Feb 8, 2025Updated last year
- Proof of concept created for 'Reflection Scan: an Off-Path Attack on TCP'.☆11Jan 20, 2012Updated 14 years ago
- ☆16Mar 7, 2026Updated 2 weeks ago
- ☆36Apr 3, 2023Updated 2 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- PoC Bypass Chrome Cookies App-Bound Encryption v20☆11Apr 9, 2025Updated 11 months ago
- BOF that finds all the Nt* system call stubs within NTDLL and overwrites with clean syscall stubs (user land hook evasion)☆195Feb 6, 2025Updated last year
- Simple example of how to remove all malwares from disk and registry.☆43Jun 13, 2019Updated 6 years ago
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆60Dec 15, 2023Updated 2 years ago
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆21Apr 19, 2024Updated last year
- This is a collection of Worms for educational purposes☆34Jul 17, 2025Updated 8 months ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 11 months ago
- ☆13Feb 29, 2020Updated 6 years ago
- IOCs collected during day-to-day activities☆119Updated this week