threatland / TL-BOTSLinks
A collection of source code for various botnets.
☆558Updated 5 years ago
Alternatives and similar repositories for TL-BOTS
Users that are interested in TL-BOTS are comparing it to the libraries listed below
Sorting:
- A collection of source code for various RATs, Stealers, and other Trojans.☆442Updated 5 years ago
- HTTP Botnet☆904Updated 4 years ago
- Malware exploits☆548Updated 5 years ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆398Updated 6 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆331Updated 10 months ago
- Botnet☆900Updated 2 years ago
- Modern tactical exploitation toolkit.☆850Updated 11 months ago
- PowerShell ReverseTCP Shell - Framework☆1,056Updated 2 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆549Updated 7 months ago
- mXtract - Memory Extractor & Analyzer☆593Updated 3 years ago
- fireELF - Fileless Linux Malware Framework☆667Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago
- A collection of fraud related tools for research.☆149Updated 5 years ago
- A simple, fully python ransomware PoC☆376Updated 5 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,283Updated 3 years ago
- Python telnet honeypot for catching botnet binaries☆306Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆546Updated 4 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆547Updated 8 months ago
- Malware sample library.☆575Updated last year
- NXcrypt - 'python backdoor' framework☆367Updated 8 years ago
- collection of articles/books about programing☆575Updated last year
- Python Decoders for Common Remote Access Trojans☆1,094Updated 11 months ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆470Updated 4 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- Framework for building Windows malware, written in C++☆523Updated 5 months ago
- Python / C# Unmanaged PowerShell based RAT☆777Updated 2 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆913Updated last year
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Updated 5 years ago
- Undetectable Windows Payload Generation☆1,599Updated 2 years ago