Botnet malware designed to infect and control a set of raspberry PIs. For educational purposes only.
☆14May 23, 2018Updated 7 years ago
Alternatives and similar repositories for 60467_raspPiBotnet
Users that are interested in 60467_raspPiBotnet are comparing it to the libraries listed below
Sorting:
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆23Jan 29, 2024Updated 2 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Chrome Crusader☆24Jun 19, 2019Updated 6 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- just a python script for cve-2017-12615☆11Oct 1, 2017Updated 8 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- A way to track and visualize current and past locations of multiple cell phones on Google Maps. Includes geofencing, prevents texting wit…☆13Dec 9, 2012Updated 13 years ago
- Live demonstration buttons for https://developers.google.com/pay/api/web/guides/resources/demos☆11Feb 22, 2026Updated last week
- A place for personal ad hoc scripts☆10Jun 9, 2021Updated 4 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- Autoconnect MSR-100 Magnetic Stripe Card Reader and returns CardInfo on Swipe event.☆13Sep 26, 2022Updated 3 years ago
- Analizador de tráfico para dispositivos Android potencialmente comprometidos como parte de una botnet orientado a detectar ataques DDoS.☆13Jun 20, 2018Updated 7 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- Python wrapper for gatttool from BlueZ to access Bluetooth LE Devices☆12Nov 13, 2015Updated 10 years ago
- SECD machine and Lispkit Lisp compiler, in Python☆10Oct 25, 2017Updated 8 years ago
- Some concept code for bypassing the Android lock screen from recovery mode☆16Mar 28, 2011Updated 14 years ago
- A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.☆16May 22, 2025Updated 9 months ago
- SMS BOMBING AND MAIL BOMBING.☆58Mar 29, 2023Updated 2 years ago
- This project is for internal purposes only and not meant to be public; it is not meant to be made private either. Such is life—complicate…☆14Jul 22, 2025Updated 7 months ago
- A clean-HDMI-Output PMCA application for Sony cameras☆16Sep 5, 2022Updated 3 years ago
- Freaking Injector is a tool which made for injecting dlls into other processes in Windows x64 systems with bunch of diffrent injection me…☆11Dec 3, 2020Updated 5 years ago
- ☆11May 24, 2020Updated 5 years ago
- A kernel module to read/write QFPROM rows on Qualcomm SoC devices with TCP server support.☆15Mar 30, 2016Updated 9 years ago
- Bitcoin Payment Channels built on BitPay's libraries for Angel Hack 2014☆14Aug 20, 2014Updated 11 years ago
- VBS Crypter, Exe To VBS☆15Aug 5, 2022Updated 3 years ago
- sms sniffer and imsi catcher☆18Apr 9, 2021Updated 4 years ago
- A WiFi hacking Phishing tool for everyone.☆15Mar 31, 2023Updated 2 years ago
- Batch Scripts for Building ArrayFire on Windows☆11Sep 23, 2017Updated 8 years ago
- XHacks: Python-fueled nightmare for X account defenses. AI-driven brute-force tears through with ruthless stealth and speed. Ethical hack…☆16Nov 14, 2025Updated 3 months ago
- Botnet (Zombie Networks) with C# and Web Socket☆15Jul 8, 2014Updated 11 years ago
- ☆13Dec 21, 2019Updated 6 years ago
- machinelearning stuff☆13Nov 2, 2017Updated 8 years ago