| sweetsoftware/Ares |
1,345 |
|
0 |
0 |
about 3 years ago |
0 |
|
43 |
|
Python |
| Python botnet and backdoor |
| quantumcore/paradoxiaRAT |
663 |
|
0 |
0 |
almost 3 years ago |
0 |
|
3 |
mit |
C |
| ParadoxiaRat : Native Windows Remote access Tool. |
| AHXR/ghost |
632 |
|
0 |
0 |
almost 5 years ago |
0 |
|
6 |
gpl-3.0 |
C++ |
| :ghost: RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware |
| onionj/pybotnet |
232 |
|
0 |
0 |
about 2 years ago |
50 |
January 09, 2023 |
8 |
lgpl-2.1 |
Python |
| PyBotNet: A High-Level Remote Control Framework for Python with Telegram Integration |
| lontivero/vinchuca |
57 |
|
0 |
0 |
about 9 years ago |
0 |
|
3 |
mit |
C# |
| A resilient peer-to-peer botnet agent in .NET |
| mathio3/Ro3b-HTTP-botnet |
38 |
|
0 |
0 |
almost 3 years ago |
0 |
|
0 |
|
|
| Ro3b - Advance Banking HTTP Botnet |
| khr0x40sh/Galvatron |
34 |
|
0 |
0 |
over 4 years ago |
0 |
|
1 |
|
PowerShell |
| Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but effective obfuscation. Egress over ICMP and DNS are planned as features. Lastly, the server code is designed to setup the C2 on a LAMP-esque server. The default creds are admin/admin. |
| trackmastersteve/HackServ |
34 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
mit |
Python |
| Python 3 ChatBot / Botnet |
| C0ba1t/Ro3b-HTTP-botnet |
23 |
|
0 |
0 |
almost 3 years ago |
0 |
|
1 |
|
|
| alexfrancow/badusb_botnet |
16 |
|
0 |
0 |
over 6 years ago |
0 |
|
0 |
|
PowerShell |
| :busts_in_silhouette::smiling_imp: Infect a pc with badusb and establish a connection through telegram. |