xandiboo / leaksLinks
Compromised SSH servers and scraped websites revealed leaked hacking tools.
☆125Updated 11 months ago
Alternatives and similar repositories for leaks
Users that are interested in leaks are comparing it to the libraries listed below
Sorting:
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆132Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 3 years ago
- A Windows Botnet written in Golang☆93Updated 2 weeks ago
- Search GitHub for public Shodan api keys☆77Updated last year
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆15Updated 6 years ago
- layer7 mirai private layer4 ovh bypass nfo bypass☆44Updated 3 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆188Updated 4 months ago
- Katana Botnet used for DDoS attacks based on the Mirai Botnet. TEACHING PURPOSES ONLY! I CANNOT BE HELD RESPONSIBLE FOR ANYTHING YOU DO W…☆54Updated 2 years ago
- Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.☆201Updated 2 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Updated 3 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆127Updated 2 years ago
- I know! Word in the DDoS community this Mortem botnet isn't as scary as it seems. You feel more powerful as you scroll around the methods…☆47Updated 2 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆184Updated 5 years ago
- People have been wanting this Mirai Botnet for awhile now. The Joker Mirai V1 developed by IoTNet himself. This powerful botnet has the b…☆129Updated 2 years ago
- An open-source, centralized HTTPS botnet☆75Updated 2 years ago
- 🚨 Check the asn is able to use for ip header modification or no☆48Updated 4 months ago
- New Redline Leak☆128Updated 4 years ago
- UNFINISHED Botnet using a Go and Bootstrap Based C2, Support for Windows, Linux and Android Clients.☆100Updated 3 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆63Updated 4 years ago
- Nebula C2 - Python☆98Updated 7 months ago
- Setup mirai botnet. Only for educational purpose!☆98Updated last year
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methods☆33Updated 3 years ago
- Exploits | MIRAI AND SCANNERS | Layer4 Methods | Layer7 Methods | UDP METHODS | TCP METHODS | BRUTERS | VULN | LISTS☆66Updated last year
- Best DDoS Attack Script With 36 Plus Methods☆130Updated this week
- The malware is un-killable and fully undetectable by antivirus, developed by Kingsman. It steals the browser passwords, Discord Tokens & …☆58Updated 4 years ago
- An ADB-based botnet written in C.☆45Updated 3 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- Qbot Source, Scanners, loaders....☆11Updated 2 years ago
- Contact Telegram : https://t.me/hakanonymos☆53Updated last year
- THANKS YOU FOR CODE | credit NixWasHere/NixC2☆61Updated 5 months ago