Showing 3 open source projects for "ddos botnet windows"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1

    Not Another MAC Address Generator

    Generates using (OUI) Verified MAC Addresses

    NAMAG (Not Another MAC Address Generator) Generates using (OUI) Verified MAC Addresses using oui.csv - OUI = Organizationally unique identifier from Standards.IEEE.org: http://standards.ieee.org/develop/regauth/oui/oui.txt Can save with multiply styles HEX: 00:00:00:00:00:00 HEX: 00-00-00-00-00-00 HEX: 000000000000 In order to run NAMAG you must have the VB6.0 Runtime files which can be downloaded from Microsoft's website: http://www.microsoft.com/en-us/download/details.aspx?id=24417
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Floodtrooper Http Botnet

    Floodtrooper Http Botnet

    Visual Basic based http botnet program

    Floodtrooper is a http botnet program which takes its commands from a txt file on given URL. -It takes target IP from: http://www.x.com/floodtrooper/ip.txt commands from: http://www.x.com/floodtrooper/komut.txt and you can see how many botnet you have with an asp or php file which shows you online users(you can use whos.among.us) http://www.x.com/user/online.asp -It copies itself to startup -It has ping flood attack method (you can develop this it's weakest way to make dos)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Janibot Irc Botnet

    Janibot Irc Botnet

    Irc controlling botnet

    It's a botnet which controlling via irc server. It has udp and ping flood attack methods
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB