DotNetRussell / MinerInTheMiddleLinks
This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads
☆82Updated 5 years ago
Alternatives and similar repositories for MinerInTheMiddle
Users that are interested in MinerInTheMiddle are comparing it to the libraries listed below
Sorting:
- Scan the entire internet for SSH and Telnet services. Then hack them.☆79Updated 3 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆78Updated 2 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- A simple and easy to use JS Botnet☆99Updated 3 years ago
- A malicious access point that injects mining scripts on the fly.☆15Updated 4 years ago
- Ro3b - Advance Banking HTTP Botnet☆52Updated 2 years ago
- SMS Phishing Tools☆80Updated 8 years ago
- Control remote computers using discord bot and python 3.☆182Updated 3 years ago
- An open-source, centralized HTTPS botnet☆77Updated 2 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆22Updated 7 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆24Updated 7 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆79Updated 5 years ago
- A Simple C&C Server Written In Python☆34Updated 7 years ago
- Fully Undetectable telegram Rat dropper☆37Updated 5 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆61Updated 4 years ago
- SQLi Google Dork Scanner☆59Updated 3 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆27Updated 8 years ago
- A simple phishing tool that can phish almost any website☆79Updated 7 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆122Updated last year
- Crappy cookie stealer☆105Updated 5 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆46Updated 8 years ago
- Fast exploitation based on metasploit.☆75Updated 5 years ago
- a simple hidden silent XMR miner.☆192Updated 6 years ago
- crypto-yank matches and replaces crypto-currency addresses found in the clipboard.☆89Updated 4 months ago
- Multiplatform payload dropper☆275Updated 4 years ago
- It'll grab the IP sitting behind Cloudflare ¯\_(ツ)_/¯☆19Updated 8 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆67Updated 4 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 6 years ago