tklab-tud / BSFLinks
Botnet Simulation Framework
☆77Updated 5 years ago
Alternatives and similar repositories for BSF
Users that are interested in BSF are comparing it to the libraries listed below
Sorting:
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- Tool to predict attacker groups from the techniques and software used☆50Updated 4 years ago
- ☆50Updated 5 years ago
- Community-based integrated malware identification system☆81Updated 3 years ago
- HashCobra Hash Cracking tool.☆122Updated 5 years ago
- ☆30Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- ☆53Updated 4 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆32Updated 4 years ago
- This is a concept poc of command and control server implemented over blockchain☆54Updated 6 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- Python script to automatically deobfuscate malware code☆59Updated 7 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 4 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- A simple python reverse shell written just for fun.☆63Updated 2 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago