DotNetRussell / MinerInTheMiddle
This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads
☆77Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for MinerInTheMiddle
- Scan the entire internet for SSH and Telnet services. Then hack them.☆76Updated 2 years ago
- SQLi Google Dork Scanner☆60Updated 2 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 5 years ago
- Ransomware builder☆84Updated 4 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 7 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆25Updated 7 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆73Updated last year
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆57Updated 3 years ago
- Automatic Ducky Payload Generator☆16Updated 2 years ago
- a simple hidden silent XMR miner.☆182Updated 5 years ago
- A simple and easy to use JS Botnet☆96Updated 2 years ago
- Hidden miner builder☆102Updated 2 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆45Updated 7 years ago
- An open-source, centralized HTTPS botnet☆72Updated last year
- (Windows/Linux/Mac) Remote Administration Tool☆59Updated 3 years ago
- Help a buddy prank his colleagues! Show your mettle with spoofing emails, malicious attachments, spoofing sms, and spoofing phone calls t…☆95Updated 8 years ago
- Fake access point using dns spoof and ssl stripping☆23Updated 6 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆26Updated 4 years ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆85Updated 5 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆71Updated 4 years ago
- A malicious access point that injects mining scripts on the fly.☆15Updated 3 years ago
- A Linux Cyptomining malware☆36Updated last year
- this makes your payloads, trojans, viruses fully undetectable☆7Updated 6 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆21Updated 6 years ago
- Disclaimer :- I am not promoting any illegal activity here . this is purely for educational purpose . i am not responsible if you use it …☆47Updated last year
- Fully Undetectable telegram Rat dropper☆32Updated 4 years ago