trewchainz / conficker
Python emulation of the Conficker worm
☆8Updated 10 years ago
Alternatives and similar repositories for conficker:
Users that are interested in conficker are comparing it to the libraries listed below
- (In Progress) aims to develop an environment capable to simulate Botnet P2P Zeus,☆9Updated 10 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆28Updated 4 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 7 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆25Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆17Updated 11 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆14Updated 8 years ago
- iSpy Keylogger☆42Updated 8 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- Miscellaneous exploit code☆19Updated 8 years ago
- HEVD exploits☆9Updated 6 years ago
- Share wifi on windows with arranged password like every hour or every day☆15Updated 7 years ago
- botnet scanner written in python☆8Updated 6 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- SkyRAT - Powershell Remote Administration Tool☆31Updated 7 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 7 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Better Remote Access Trojan☆48Updated 8 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago