All Projects → pylyf → Networm

pylyf / Networm

Licence: mit
Python network worm that spreads on the local network and gives the attacker control of these machines.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Networm

Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+371.11%)
Mutual labels:  hacking, pentesting, trojan, backdoor, rat
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+4302.96%)
Mutual labels:  hacking, malware, trojan, backdoor, rat
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+131.11%)
Mutual labels:  hacking, malware, trojan, backdoor, rat
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+437.04%)
Mutual labels:  hacking, pentesting, malware, backdoor
Unencrypted Backdoor With Process Cloaking
Unencrypted backdoor
Stars: ✭ 16 (-88.15%)
Mutual labels:  malware, trojan, backdoor, rat
Lime Rat
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+391.11%)
Mutual labels:  malware, trojan, backdoor, rat
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-10.37%)
Mutual labels:  hacking, pentesting, malware, rat
ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+125.93%)
Mutual labels:  backdoor, malware, trojan, rat
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+186.67%)
Mutual labels:  hacking, malware, backdoor, rat
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+1252.59%)
Mutual labels:  pentesting, backdoor, rat
Hacktheworld
An Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+290.37%)
Mutual labels:  hacking, malware, backdoor
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+4890.37%)
Mutual labels:  pentesting, backdoor, rat
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (+192.59%)
Mutual labels:  hacking, backdoor, rat
Njrat 0.7d Stub Csharp
njRAT C# Stub - Fixed For PowerShell
Stars: ✭ 28 (-79.26%)
Mutual labels:  malware, backdoor, rat
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+634.81%)
Mutual labels:  hacking, backdoor, rat
Mass Rat
Basic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (-5.93%)
Mutual labels:  malware, backdoor, rat
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+738.52%)
Mutual labels:  hacking, malware, backdoor
Spacecow
Windows Rootkit written in Python
Stars: ✭ 81 (-40%)
Mutual labels:  malware, trojan, rat
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-35.56%)
Mutual labels:  pentesting, backdoor, rat
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+6552.59%)
Mutual labels:  hacking, pentesting, malware

NetWorm

forthebadge made-with-python

Python network worm that spreads on the local network and gives the attacker control of these machines.

This code is not finished and works more like a "worm template" for you to get inspiration at the moment.

You can bruteforce ssh servers, spread with USBs, etc..

Executing

Windows & Linux:

python worm.py

Screenshots

bruteforcing local machines Bruteforcing local machines with port 22 open.

Meta

https://github.com/pylyf/NetWorm

Distributed under the MIT license.

Contributing

  1. Fork it (https://github.com/pylyf/NetWorm/fork)
  2. Create your feature branch (git checkout -b feature/fooBar)
  3. Commit your changes (git commit -am 'Add some fooBar')
  4. Push to the branch (git push origin feature/fooBar)
  5. Create a new Pull Request

Legal Advice

THIS REPOSITORY AND EVERY SCRIPT INCLUDED IN IT IS FOR EDUCATIONAL AND TESTING PURPOSES ONLY. THE OWNER NOR ANY CONTRIBUTOR IS NOT RESPONSIBLE FOR YOUR ACTIONS.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].