stphivos / bruteworm
A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines
☆29Updated 9 years ago
Alternatives and similar repositories for bruteworm
Users that are interested in bruteworm are comparing it to the libraries listed below
Sorting:
- PoC Android smart phone botnet☆78Updated 12 years ago
- Mutation Of Vıruses☆50Updated 9 years ago
- Better Remote Access Trojan☆49Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- iSpy Keylogger☆42Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 8 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 7 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆16Updated 9 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆29Updated 4 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Password cracking utility☆53Updated 4 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 7 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆18Updated 6 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆33Updated 8 years ago
- Small backdoor using cookie.☆60Updated 8 years ago
- Post-Exploitation Framework☆77Updated 8 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago