The Mirai Botnet Source Code in Python
☆40Nov 7, 2018Updated 7 years ago
Alternatives and similar repositories for PyMirai
Users that are interested in PyMirai are comparing it to the libraries listed below
Sorting:
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆28Apr 15, 2017Updated 8 years ago
- PINTool to help analyzing malware that uses process injection☆15Jan 3, 2022Updated 4 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- ☆13May 24, 2023Updated 2 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- ☆26Jun 19, 2022Updated 3 years ago
- legacy Botnets source code Forked from github.com/malwares☆27Jan 30, 2022Updated 4 years ago
- An open-source session replay tool for single-page applications that uses AI analysis, aggregated trends, and a RAG chatbot to help devel…☆11Jan 23, 2026Updated last month
- a socks proxy protocol implement by golang, support socks 4, 4a and 5☆30Sep 1, 2022Updated 3 years ago
- Golang version of https://github.com/hasherezade/libpeconv☆29Jan 31, 2020Updated 6 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- ☆13Nov 19, 2022Updated 3 years ago
- Includes several examples of data manipulation techniques by using PySpark and machine learning algorithms using MLib☆10Jun 14, 2021Updated 4 years ago
- Presets for FxSound equalizer software for boosting sound quality, volume, and bass☆11Nov 19, 2025Updated 3 months ago
- python remote access trojan☆39Feb 8, 2017Updated 9 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Mar 20, 2019Updated 6 years ago
- Calculate how much a LLM completion costs☆16Updated this week
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- ☆12May 12, 2024Updated last year
- ALL IN ONE Hacking Tool For Hackers☆10Jun 2, 2022Updated 3 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆34Oct 6, 2016Updated 9 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- mass-contact text/SMS distribution tool☆11Apr 28, 2025Updated 10 months ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- Multiplatform Build Settings is an Unity tool for building to multiple platforms at once, each with their own unique settings.☆10Sep 3, 2024Updated last year
- ☆12Dec 30, 2020Updated 5 years ago
- An open source deep learning library for Unity.☆17Jan 8, 2026Updated last month
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- ☆16Aug 16, 2022Updated 3 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 8 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago