xandiboo / leaksLinks
Compromised SSH servers and scraped websites revealed leaked hacking tools.
☆117Updated 8 months ago
Alternatives and similar repositories for leaks
Users that are interested in leaks are comparing it to the libraries listed below
Sorting:
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆121Updated last year
- Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.☆201Updated 2 years ago
- HTTP Botnet in C, Cross Compilable. (Layer 7 - Layer 4) - 11 Methods☆33Updated 2 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆62Updated 4 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆15Updated 6 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆187Updated 2 months ago
- Katana Botnet used for DDoS attacks based on the Mirai Botnet. TEACHING PURPOSES ONLY! I CANNOT BE HELD RESPONSIBLE FOR ANYTHING YOU DO W…☆51Updated 2 years ago
- Search GitHub for public Shodan api keys☆73Updated last year
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆38Updated 4 years ago
- An open-source, centralized HTTPS botnet☆74Updated 2 years ago
- Nebula C2 - Python☆93Updated 4 months ago
- I know! Word in the DDoS community this Mortem botnet isn't as scary as it seems. You feel more powerful as you scroll around the methods…☆43Updated 2 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆24Updated 2 years ago
- THANKS YOU FOR CODE | credit NixWasHere/NixC2☆58Updated 2 months ago
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- AXIS Botnet☆16Updated last year
- 🚨 Check the asn is able to use for ip header modification or no☆45Updated 2 months ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆129Updated 2 years ago
- An ADB-based botnet written in C.☆44Updated 3 years ago
- Collection Of LolSec☆37Updated 6 years ago
- New Redline Leak☆127Updated 4 years ago
- People have been wanting this Mirai Botnet for awhile now. The Joker Mirai V1 developed by IoTNet himself. This powerful botnet has the b…☆117Updated 2 years ago
- layer7 mirai private layer4 ovh bypass nfo bypass☆39Updated 2 years ago
- Qbot Source, Scanners, loaders....☆11Updated 2 years ago
- Hard-Hitting ddos script used by lulsec☆43Updated 8 years ago
- A Windows Botnet written in Golang☆89Updated 2 years ago
- Best DDoS Attack Script With 36 Plus Methods☆124Updated 9 months ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- The malware is un-killable and fully undetectable by antivirus, developed by Kingsman. It steals the browser passwords, Discord Tokens & …☆59Updated 4 years ago