reveal xored strings in mirai binary
☆12Oct 24, 2018Updated 7 years ago
Alternatives and similar repositories for mirai-utils
Users that are interested in mirai-utils are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- Mirai Botnet DB Project☆26Mar 20, 2019Updated 7 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆24Apr 12, 2019Updated 6 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Twilio log viewer / dashboard replacement. Faster than the Twilio API☆11Mar 21, 2024Updated 2 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- round robin port redirector☆14Dec 23, 2022Updated 3 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- Honeypot built to mimic an insecure GoAhead Wifi Camera☆18Apr 4, 2017Updated 8 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.☆11Dec 13, 2021Updated 4 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- 🔐 Wrap keys from HSM using CKM_RSA_AES_KEY_WRAP step by step☆13Dec 10, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- Script that monitors the clipboard and plays Youtube videos.☆12Apr 16, 2018Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Unofficial The Commonwealth Bank of Australia NetBank API wrap for PHP☆11Feb 3, 2019Updated 7 years ago
- Embeddable Prolog dialect implemented in pure Python. Stores its knowlegdebase using SQLAlchemy for scalability.☆20Jan 6, 2018Updated 8 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- Lightweight Ransomware @Choudai☆14May 28, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This project is a collection of malware signatures for KicomAV.☆11Jan 23, 2026Updated 2 months ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- ☆17Sep 9, 2022Updated 3 years ago
- Clash Royale protocol dissector for Wireshark☆15Dec 8, 2016Updated 9 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- Simple SSH brute-forcer written in Go☆24May 29, 2016Updated 9 years ago
- Cable modem firmware dump☆41Jun 30, 2015Updated 10 years ago