A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines
☆30Sep 28, 2015Updated 10 years ago
Alternatives and similar repositories for bruteworm
Users that are interested in bruteworm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- A simple script that scans a webserver for suspicious looking php files☆14Oct 31, 2014Updated 11 years ago
- Windows Remote Access Trojan (RAT)☆88Nov 12, 2015Updated 10 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Feb 4, 2017Updated 9 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Notes to the book☆20Oct 29, 2015Updated 10 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- Open source exploit framework made in C#☆54Jan 27, 2025Updated last year
- Linux backdoor implementation written in Python☆58May 25, 2015Updated 10 years ago
- Library system for windows batch files using batch macros☆15Feb 12, 2024Updated 2 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆76Jun 18, 2021Updated 4 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆18Jan 29, 2012Updated 14 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Injector能夠在iOS介面上瀏覽網路封包、網路使用狀態、區域網路主機訊息、系統工具、網路工具指令、防火牆...等功能。 Injector function: browse network packet, network usage, LAN host configur…☆22Oct 9, 2016Updated 9 years ago
- A proof-of-concept for ransomware encryption☆19Nov 29, 2025Updated 5 months ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- ☆16May 6, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- Batch NetWork Worm with Download & Execute Payload☆10May 26, 2020Updated 5 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- TDL4 style rootkit to spoof read/write requests to master boot record☆133Jan 15, 2018Updated 8 years ago
- Stagefright Android exploit☆19Aug 11, 2022Updated 3 years ago
- generates an encrypted reverse tcp tunnel implementation in php☆19Oct 22, 2012Updated 13 years ago
- Un simple reverse shell indétectable (1/65 sur virustotal au 12/02/2022) écrit en C# qui utilise un client socket UDP sur le port 53 (por…☆12Feb 12, 2022Updated 4 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- A simple storage class inspired by the redis api on top of Sqlite.☆16Dec 8, 2015Updated 10 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago