This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads
☆84Aug 23, 2020Updated 5 years ago
Alternatives and similar repositories for MinerInTheMiddle
Users that are interested in MinerInTheMiddle are comparing it to the libraries listed below
Sorting:
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- A simple tool to convert network traffic directly into sound.☆14Aug 29, 2023Updated 2 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- Show the marketplace profile from FB☆14May 4, 2022Updated 3 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- a simple hidden silent XMR miner.☆193Jan 26, 2019Updated 7 years ago
- Mutation Of Vıruses☆49Dec 10, 2015Updated 10 years ago
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Aug 13, 2017Updated 8 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- A malicious access point that injects mining scripts on the fly.☆16Dec 7, 2020Updated 5 years ago
- DES Encrypter/Decrypter☆20Feb 12, 2017Updated 9 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- Ransomware written in vb.net for eduational purpouses☆13Aug 19, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Oct 6, 2022Updated 3 years ago
- It'll grab the IP sitting behind Cloudflare ¯\_(ツ)_/¯☆19Jun 2, 2017Updated 8 years ago
- Pywallet 2.2 which was a fork created by jackjack of Joric's pywallet with the recover function☆16Jan 2, 2018Updated 8 years ago
- A simple Cryptojacking malware made with Go and XMRig, for educational purposes only.☆19Apr 19, 2020Updated 5 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Automating Jenkins Hacking using Shodan API☆94Mar 24, 2018Updated 7 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆23May 17, 2018Updated 7 years ago
- Miner(cpu or gpu) for bitcoin, secretly run in a period of time☆23Dec 26, 2022Updated 3 years ago
- Proxy scraper for proxychains☆43Oct 10, 2020Updated 5 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- This is a tool written in PHP to test the security of Instagram accounts through BruteForce.☆21Jun 23, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- Trojans/Viruses/Worms/Rootkits Source Code Repository☆21Nov 7, 2015Updated 10 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- ☆29Apr 16, 2020Updated 5 years ago
- Simple python malware for back connect in windows☆59Apr 24, 2018Updated 7 years ago
- Account checker for Spotify music service.☆27Oct 10, 2021Updated 4 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago