This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads
☆84Aug 23, 2020Updated 5 years ago
Alternatives and similar repositories for MinerInTheMiddle
Users that are interested in MinerInTheMiddle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- Hidden miner builder☆120Jun 23, 2022Updated 3 years ago
- some python3 functions to add spreading features to any python backdoor☆56Jan 22, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- Mutation Of Vıruses☆49Dec 10, 2015Updated 10 years ago
- A nice friendly simple and easly customizable GUI for coinhives javascript miner to embed onto websites so users of your site can interac…☆72Mar 21, 2023Updated 3 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- Hack facebook using this python script - Kali Linux☆15Jun 14, 2021Updated 4 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- Paytoshi Faucet script☆11May 31, 2016Updated 9 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆77Jun 18, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- A simple tool to convert network traffic directly into sound.☆14Aug 29, 2023Updated 2 years ago
- This is a tool written in PHP to test the security of Instagram accounts through BruteForce.☆21Jun 23, 2018Updated 7 years ago
- This is the codebase for Faucet, described in our manuscript: https://academic.oup.com/bioinformatics/article/34/1/147/4004871, by Roye R…☆18May 21, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A tool to spider Github or search URLs for various information leaks☆33May 22, 2023Updated 2 years ago
- A couple of methods to keep your Glitch projects online 24/7.☆12Mar 25, 2023Updated 3 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Python-powered Bitcoin Faucet Script☆14Dec 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Faucet GUI (a.k.a virtnet-creator) is an easy to use interface for building faucet configuration files.☆24Aug 31, 2018Updated 7 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- DJI Duml Packet Parser☆11Sep 23, 2018Updated 7 years ago
- Securix Main repository including installer and controll scripts☆14May 14, 2020Updated 5 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- Simple console based Windows key-logger created in C++☆16Nov 5, 2021Updated 4 years ago
- A bash script to easily run TOR hidden service on termux and most linux distros☆51Jul 6, 2023Updated 2 years ago
- Show the marketplace profile from FB☆12May 4, 2022Updated 3 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆19Jul 14, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆14Jan 20, 2018Updated 8 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- Program bypasses the UAC prompt for Admin privileges when running a program.☆16Nov 24, 2023Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Dec 9, 2017Updated 8 years ago
- multi faucet free 2☆15Jan 16, 2022Updated 4 years ago
- Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.☆130Aug 13, 2018Updated 7 years ago
- UAC bypass and Elevate☆14Sep 24, 2016Updated 9 years ago