trewchainz / confickerLinks
Python emulation of the Conficker worm
☆8Updated 11 years ago
Alternatives and similar repositories for conficker
Users that are interested in conficker are comparing it to the libraries listed below
Sorting:
- Capstone: Keylogger Trojan☆35Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- (In Progress) aims to develop an environment capable to simulate Botnet P2P Zeus,☆9Updated 10 years ago
- Mirai Botnet DB Project☆26Updated 6 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Updated 6 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆49Updated 6 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- pentest toolbox☆28Updated 2 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆36Updated 11 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆45Updated 3 years ago
- A Linux Cyptomining malware☆36Updated 2 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Updated 7 years ago
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆19Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Mutation Of Vıruses☆49Updated 9 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆29Updated 4 years ago
- botnet scanner written in python☆10Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆14Updated 3 years ago