A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines
☆29Sep 28, 2015Updated 10 years ago
Alternatives and similar repositories for bruteworm
Users that are interested in bruteworm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- A simple script that scans a webserver for suspicious looking php files☆14Oct 31, 2014Updated 11 years ago
- Windows Remote Access Trojan (RAT)☆87Nov 12, 2015Updated 10 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Feb 4, 2017Updated 9 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Notes to the book☆20Oct 29, 2015Updated 10 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- Open source exploit framework made in C#☆54Jan 27, 2025Updated last year
- Linux backdoor implementation written in Python☆58May 25, 2015Updated 10 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 9 months ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- XSS Worm which steals victim's cookies and some information also spread others. Written in js, php and java.☆10Dec 12, 2017Updated 8 years ago
- Remake of OSIF by CiKu370☆15Dec 17, 2020Updated 5 years ago
- This is a simple tool to automatically deface vulnerable websites☆12Oct 16, 2025Updated 5 months ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆77Jun 18, 2021Updated 4 years ago
- Scripts for Network Pentesting