trewchainz / conficker
Python emulation of the Conficker worm
☆8Updated 11 years ago
Alternatives and similar repositories for conficker
Users that are interested in conficker are comparing it to the libraries listed below
Sorting:
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- (In Progress) aims to develop an environment capable to simulate Botnet P2P Zeus,☆9Updated 10 years ago
- A Linux Cyptomining malware☆36Updated 2 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Updated 7 years ago
- iSpy Keylogger☆42Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- botnet scanner written in python☆10Updated 7 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Linux bash script automation for metasploit☆10Updated 9 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 8 years ago
- pentest toolbox☆28Updated 2 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 7 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Various Crypter Project☆9Updated 11 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆22Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆16Updated 9 years ago
- A collection of Windows, Website and Wifi pentesting scripts and exploits.☆16Updated 3 years ago
- PoC Android smart phone botnet☆78Updated 12 years ago
- BlackWorm SRC Extract☆16Updated 8 years ago