utkusen / janibotLinks
an ancient irc botnet
☆12Updated 10 years ago
Alternatives and similar repositories for janibot
Users that are interested in janibot are comparing it to the libraries listed below
Sorting:
- an ancient http botnet☆15Updated 10 years ago
- python version of "house party protocol" program☆25Updated 10 years ago
- yet another solution for dining philosophers problem☆6Updated 9 years ago
- Scenario-based WiFi Network Threat Simulation☆9Updated 5 years ago
- a simple blackjack game supported by card counting and basic strategy☆10Updated 9 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago
- This directory contains random scripts from threat hunting or malware research☆11Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 9 years ago
- Carve shellcode within the memory using restrictive character set☆9Updated 7 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- an ultimate evidence wiper☆65Updated 10 years ago
- ☆10Updated 5 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Random stuff☆16Updated 7 years ago
- BASH + VIM = Cryptolocker☆11Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Simple And Fast Subdomain Take Over Checker☆9Updated 6 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆19Updated 3 years ago