DotNetRussell / MinerInTheMiddleLinks
This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads
☆79Updated 4 years ago
Alternatives and similar repositories for MinerInTheMiddle
Users that are interested in MinerInTheMiddle are comparing it to the libraries listed below
Sorting:
- Scan the entire internet for SSH and Telnet services. Then hack them.☆80Updated 2 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆76Updated 2 years ago
- A simple and easy to use JS Botnet☆101Updated 3 years ago
- A Linux Cyptomining malware☆36Updated 2 years ago
- Bind 2 exe's and have them run at the same time.☆46Updated 10 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Hidden miner builder☆110Updated 2 years ago
- An open-source, centralized HTTPS botnet☆73Updated 2 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆59Updated 3 years ago
- A malicious access point that injects mining scripts on the fly.☆15Updated 4 years ago
- Ransomware builder☆88Updated 5 years ago
- this makes your payloads, trojans, viruses fully undetectable☆7Updated 7 years ago
- crypto-yank matches and replaces crypto-currency addresses found in the clipboard.☆90Updated 11 months ago
- Fully Undetectable telegram Rat dropper☆35Updated 4 years ago
- a simple hidden silent XMR miner.☆187Updated 6 years ago
- Ro3b - Advance Banking HTTP Botnet☆49Updated last year
- Fake access point using dns spoof and ssl stripping☆22Updated 7 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Simple HTTP Pull Botnet with a very cool Web Based C&C Panel☆42Updated 4 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- blackhole is a ransomware coded in c#☆27Updated 5 years ago
- The Open Tor Botnet (ZIB)☆30Updated 9 years ago
- MIRAI botnet in python3☆19Updated 5 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- Disclaimer :- I am not promoting any illegal activity here . this is purely for educational purpose . i am not responsible if you use it …☆48Updated 2 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143Updated 6 years ago
- boilerplate python rat☆111Updated 4 years ago