xandiboo / leaksLinks
Compromised SSH servers and scraped mirror sites leaked scripts intended for malicious use.
☆131Updated last year
Alternatives and similar repositories for leaks
Users that are interested in leaks are comparing it to the libraries listed below
Sorting:
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆132Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Updated 3 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆191Updated 6 months ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆15Updated 6 years ago
- Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.☆203Updated 2 years ago
- Katana Botnet used for DDoS attacks based on the Mirai Botnet. TEACHING PURPOSES ONLY! I CANNOT BE HELD RESPONSIBLE FOR ANYTHING YOU DO W…☆54Updated 3 years ago
- Search GitHub for public Shodan api keys☆80Updated 2 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆64Updated 4 years ago
- New Redline Leak☆129Updated 4 years ago
- Collection Of LolSec☆37Updated 6 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆127Updated 2 years ago
- 🚨 Check the asn is able to use for ip header modification or no☆53Updated 7 months ago
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methods☆34Updated 3 years ago
- A Windows Botnet written in Golang☆101Updated 2 months ago
- layer7 mirai private layer4 ovh bypass nfo bypass☆45Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 3 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆188Updated 6 years ago
- Best DDoS Attack Script With 36 Plus Methods☆131Updated 2 months ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆26Updated 3 years ago
- An open-source, centralized HTTPS botnet☆77Updated 2 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆47Updated last year
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Updated 3 years ago
- An ADB-based botnet written in C.☆45Updated 3 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- Contact Telegram : https://t.me/hakanonymos☆53Updated last year
- I know! Word in the DDoS community this Mortem botnet isn't as scary as it seems. You feel more powerful as you scroll around the methods…☆49Updated 2 years ago
- GitHub - Stealerium/Stealerium: Stealer + Clipper + Keylogger☆74Updated 2 years ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆56Updated 10 months ago
- 🔑 Open source stealer written on C#, all logs will be sent to Telegram bot.☆72Updated 3 years ago
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆39Updated 2 years ago