Showing 44 open source projects for "botnet"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    Teardroid

    Teardroid

    It's easy to use android botnet work without port forwarding

    It's easy to use Android botnet work without port forwarding, VPS, and Android Studio. Run Shell Command ( use findphno command in a run shell command to get the device phone number and use findx:pdf to find all the pdf files on the device ) It will prompt you with your Control Panel url enter your deta space control panel url without /v4 or your own server URL (without/at the end of the URL).
    Downloads: 11 This Week
    Last Update:
    See Project
  • 2
    Wraith is an open source IRC bot written in C++. It has been in development since late 2003. It is based on Eggdrop 1.6.12 but has since evolved into something much different at its core.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    UBoat HTTP

    UBoat HTTP

    HTTP Botnet

    A proof-of-concept HTTP Botnet designed to replicate a full weaponized commercial botnet. This project should be used for authorized testing or educational purposes only. The main objective behind creating this offensive project was to aid security researchers and to enhance the understanding of commercial HTTP loader-style botnets. We hope this project helps to contribute to the malware research community and that people can develop efficient countermeasures.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4

    Track -1-Generator-2017

    Generate track 1 from track 2

    ...Tags: CVV , Python , fullz , SSN , prv8 , MMN , DOB , Track1 , C++ , Track2 , carding , POS , fraud , zeus , citadel , banking , Perl , spyeye , dumps , Alina , cardable , paypal , PHP , Vskimmer , java exploit , Dexeter , blackpos , carding forum , ASM , skimmer , fake antivirus , android , ICQ , symlink , flash exploit , root , deface , hack , backtrack , apache , TDS , litespeed , linux , windows , asp , aspx , C# , python , localroot , OTR , shell , SSH , security , hacking , SQLi , XSS , CSRF , 0day , exploit , VBV , trojan , HTTP , virus , worm , DDOS , Scan , eth0 , RDP , PR , botnet , carding , centos , plesk , FUD , redhat , carding, cc checker, dump checker, cc shop, dump shop, free cvv, free dumps
    Downloads: 3 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    PcapsE-OS X
    ...Options:(1) Chat (2) Unix (3) Microsoft (4) Mac OS X (5) Network (6) DHCP (7) Firewalls (8) Routers (9) Proxy (10) Switches (11) HTTP (12) HTTPS (13) DNS (14) SW (15) Nessus (16) Tacacs+ (17) Vmware (18) Backdoors (19) Citrix (20) Mail (21) P2P (22) SQL (23) Web (24) XSS (25) Exploits (26) Xprobe (27) Nmap (28) Telnet (29) SSH (30) FTP (31) Vnc (32) Radius (33) Tor (34) Malware (35) DoS (36) Botnet (37) Openssl (38) Run cap (39) Malware News (40) Updates 2013-2014 pcaps (41) Updates 2015 pcaps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    BotBlocks

    BotBlocks block malicious IP address in windows machine

    This is a Microsoft Windows Application,the purpose of this tool is to detect the botnet,normally when you have infected with a malware etc..they create a connection back to their command and control server, this tool will monitor the tcp traffic of your machine and it will let you know if you are knowingly or unknowingly contacting a malicious IP address, the tool will made this decision based on the database attached to it(I have collected these malicious IP address through various internet sources and from my personal exepreince, so there can be false positives but users can edit and update this db by using a sqlite db browser),as soon as the tool detect a malicious traffic it will pop up a window so user has a choice to either block it or whitelist it, if user choose block it will terminate the existing connection and create windows firewall rule to block ,if user choose whitelist it will ignore further communication to this IP address.It will also create a log file inside the "C:\
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This project was just for fun. Any of this work was to try to code a botnet from scratch.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    PhishBlock

    PhishBlock

    A program that detects and blocks phishing, pharming, Hacker's C&C.

    ...Recently, most malware codes are delivered covertly to users’ personal computers through Google ads, SNS, Blogs, BBS and so on, which users visit often. And After the malware codes connect the C&C server(or Botnet), they attack, and steal information, repeatedly and persistently. Currently, there is a lack of affordable software to protect individuals personal computer’s from detecting and blocking these malware features. Generally, virus vaccine programs only detect and block files already existing inside a users’ personal computer. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Virtual Botmaster

    Simulate Botnet NetFlow traffic for research analysis

    Simulate Botnet NetFlow traffic for research analysis
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10

    distributed mining botnet

    cryptocurrency distributed mining botnet

    cryptocurrency distributed mining botnet
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Botnet Detectors Comparer

    Compares botnet detection methods

    Compares botnet detection methods by computing the error metrics by reading the labels on a NetFlow file. The original NetFlow should have a new column for the ground-truth label, and a new column with the prediction label for each botnet detection method. This program computes all the error metrics (TPR, TNR, FPR, FNR, Precision, Accuracy, ErrorRate, FMeasure1, FMeasure2, FMeasure0.5) and output the comparison results.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    Limiter (botnet & overload protection)

    Simple web protection against botnet attack

    If your web is attacked by botnet, you can include this script into it and prevent server crash. Just set up a number of allowed approaches and controled time. (for ex. 1000 users/1 min) If there were connected 1001 users in 1 minute, web will be shuted down by generated htaccess file. There is a second file(you should execute it with cron) to automaticly remove htaccess file if there will be less than 1001 users per minute.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    jTrypanosoma is a JavaScript Botnet project intended to study new techniques of botnet propagation and develop new coutermeasures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    easy http botnet
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    FlippingBitbot

    Vulnerable VM featuring Bitbot

    This is a Linux based VM that is intended as a way to get security researchers started with simple botnet research. It also requires the researcher have some ability to assess and exploit vulnerabilities, with the ultimate goal of obtaining root access to the VM. This is the second of many to come, please feel free to supply feedback so I can make future ones more enjoyable and fulfilling. The network configuration of the VM is set to auto, so it is easiest to run with some sort of DHCP server on the same network(or just select the NAT option in your virtualization software). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    IS-BotNet-CC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Network Emulator

    Distributed Network emulation tool for high rate packet

    ...So if you are interested and have C/C++ programming skills, please contact me at zahid.med@gmail.com This framework allows to emulate a network by managing ethernet packets coming from two kind of interfaces: UDP and virtual network card. This tool is similare to dynamips (GNS3) but it can manager a higher packet rate. It can help to study DDoS attacks based on Botnet using the Lightweigth C++ Virtual Machine (LwCVM) in order to emulate Bots. This project is based on the following projects and libraries: LightweighIP of the TCP/IP stack pthread libpcap for communication with virtual machines dynamips Linux MicroCore
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Http BotNet Coder : Bazaid Home : Dev-point.com/vb/ Use : VB.NET & PHP
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Floodtrooper Http Botnet

    Floodtrooper Http Botnet

    Visual Basic based http botnet program

    Floodtrooper is a http botnet program which takes its commands from a txt file on given URL. -It takes target IP from: http://www.x.com/floodtrooper/ip.txt commands from: http://www.x.com/floodtrooper/komut.txt and you can see how many botnet you have with an asp or php file which shows you online users(you can use whos.among.us) http://www.x.com/user/online.asp -It copies itself to startup -It has ping flood attack method (you can develop this it's weakest way to make dos)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Janibot Irc Botnet

    Janibot Irc Botnet

    Irc controlling botnet

    It's a botnet which controlling via irc server. It has udp and ping flood attack methods
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Levvitron Firewall/IPS

    Levvitron Firewall/IPS

    Secure your presence in cyberspace with Levvitron

    Levvitron provides one of a kind protection against hackers and network attacks. Its features include: Anti-port-scanning ability HTTPS traffic analyzer Deep packet inspector Anti-botnet capability Network buffer overflow protection Anti-OS fingerprinting protection
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22

    Log Analysis Tool Kit - LATK

    A tool suite for Log File Analysis

    ...Often when responding to a security incident the only files available are web server and proxy server logs. The tools here will aid you in detecting odd traffic such as botnet beaconing and SQL Injection attempts. The large amount of data can be overwhelming and the tools in the Log Analysis Tool Kit can be used to parse these files and build a MySQL database for querying. Currently the log formats supported are: Proxy Logs: Squid Bluecoat Web Server Logs: Apache IIS Your feedback is always appreciated. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Mobinap

    Botnet detection system.

    Measurement and mitigation of botnets independent of protocol and architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A simple log analysis and botnet detection tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB