This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads
☆84Aug 23, 2020Updated 5 years ago
Alternatives and similar repositories for MinerInTheMiddle
Users that are interested in MinerInTheMiddle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- Hidden miner builder☆119Jun 23, 2022Updated 3 years ago
- a simple hidden silent XMR miner.☆194Jan 26, 2019Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Aug 13, 2017Updated 8 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41May 18, 2022Updated 3 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- A nice friendly simple and easly customizable GUI for coinhives javascript miner to embed onto websites so users of your site can interac…☆72Mar 21, 2023Updated 3 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆18Mar 6, 2025Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆24Jan 21, 2024Updated 2 years ago
- Hack facebook using this python script - Kali Linux☆15Jun 14, 2021Updated 4 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆77Jun 18, 2021Updated 4 years ago
- Trojans/Viruses/Worms/Rootkits Source Code Repository☆21Nov 7, 2015Updated 10 years ago
- A simple tool to convert network traffic directly into sound.☆14Aug 29, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆14Jun 7, 2024Updated last year
- This is a tool written in PHP to test the security of Instagram accounts through BruteForce.☆21Jun 23, 2018Updated 7 years ago
- This is the codebase for Faucet, described in our manuscript: https://academic.oup.com/bioinformatics/article/34/1/147/4004871, by Roye R…☆18May 21, 2017Updated 8 years ago
- ☆11Apr 3, 2017Updated 8 years ago
- POC for automating the deployment of a fleet of AWS spot instance siacoin and monero cryptocurrency miners.☆18Feb 12, 2018Updated 8 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Jan 22, 2017Updated 9 years ago
- ☆13Jan 20, 2018Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Python-powered Bitcoin Faucet Script☆14Dec 8, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- Packet sniffer using scapy☆26Mar 21, 2020Updated 6 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- Securix Main repository including installer and controll scripts☆14May 14, 2020Updated 5 years ago
- Readable and Writable GPIO Node.js Streams for use with the Raspberry Pi☆12Jul 16, 2015Updated 10 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- Simple console based Windows key-logger created in C++☆16Nov 5, 2021Updated 4 years ago