stphivos / brutewormView external linksLinks
A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines
☆29Sep 28, 2015Updated 10 years ago
Alternatives and similar repositories for bruteworm
Users that are interested in bruteworm are comparing it to the libraries listed below
Sorting:
- Windows Remote Access Trojan (RAT)☆86Nov 12, 2015Updated 10 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- A proof-of-concept for ransomware encryption☆18Nov 29, 2025Updated 2 months ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Jul 4, 2017Updated 8 years ago
- Run executables from the Windows registry☆15Jul 23, 2022Updated 3 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- Windows Optimizer☆27Dec 25, 2012Updated 13 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- a more complex ransomware honeypot☆125Mar 27, 2016Updated 9 years ago
- A remote access trojan over DNS☆97Dec 23, 2015Updated 10 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆133Jan 15, 2018Updated 8 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- A little Keylogger for Windows developed in C++☆20Jan 24, 2016Updated 10 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- A standalone PHP backdoor for use on *nix and Windows systems.☆50Sep 24, 2016Updated 9 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- Open source exploit framework made in C#☆54Jan 27, 2025Updated last year
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- ☆27Nov 4, 2015Updated 10 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- Sample libraries to be used with IAT Patcher☆36Oct 1, 2022Updated 3 years ago
- VBScript obfuscation to allow PenTesters bypass countermeasures.☆125Sep 6, 2022Updated 3 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Educational botnet program to perform a DDoS attack☆186Dec 24, 2016Updated 9 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75May 8, 2018Updated 7 years ago
- A Chrome extension for quick and compact access to your bookmarks.☆10Jun 3, 2017Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago