A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines
☆29Sep 28, 2015Updated 10 years ago
Alternatives and similar repositories for bruteworm
Users that are interested in bruteworm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- A simple script that scans a webserver for suspicious looking php files☆14Oct 31, 2014Updated 11 years ago
- Windows Remote Access Trojan (RAT)☆88Nov 12, 2015Updated 10 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Start an bruteforce attack using a combolist.☆10Jun 1, 2022Updated 3 years ago
- Notes to the book☆20Oct 29, 2015Updated 10 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- Open source exploit framework made in C#☆54Jan 27, 2025Updated last year
- Linux backdoor implementation written in Python☆58May 25, 2015Updated 10 years ago
- Library system for windows batch files using batch macros☆15Feb 12, 2024Updated 2 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Remake of OSIF by CiKu370☆15Dec 17, 2020Updated 5 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆77Jun 18, 2021Updated 4 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆18Jan 29, 2012Updated 14 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- A proof-of-concept for ransomware encryption☆18Nov 29, 2025Updated 4 months ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16May 6, 2015Updated 10 years ago
- ☆14Feb 9, 2020Updated 6 years ago
- Batch NetWork Worm with Download & Execute Payload☆11May 26, 2020Updated 5 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆134Jan 15, 2018Updated 8 years ago
- Stagefright Android exploit☆18Aug 11, 2022Updated 3 years ago
- generates an encrypted reverse tcp tunnel implementation in php☆19Oct 22, 2012Updated 13 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 4 months ago
- The source code of iDecryptIt - an IPSW firmware decryption tool☆17Mar 11, 2026Updated last month