This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cryptocurrency miners into the response payloads
☆84Aug 23, 2020Updated 5 years ago
Alternatives and similar repositories for MinerInTheMiddle
Users that are interested in MinerInTheMiddle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆25May 1, 2017Updated 9 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- Hidden miner builder☆119Jun 23, 2022Updated 3 years ago
- a simple hidden silent XMR miner.☆188Jan 26, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Aug 13, 2017Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41May 18, 2022Updated 3 years ago
- A simple Cryptojacking malware made with Go and XMRig, for educational purposes only.☆20Apr 19, 2020Updated 6 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- sudo heap overflow to LPE, in Go☆16Feb 9, 2021Updated 5 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆13Sep 17, 2025Updated 7 months ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆24Jan 21, 2024Updated 2 years ago
- Hack facebook using this python script - Kali Linux☆15Jun 14, 2021Updated 4 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆76Jun 18, 2021Updated 4 years ago
- This is a tool written in PHP to test the security of Instagram accounts through BruteForce.☆21Jun 23, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- POC for automating the deployment of a fleet of AWS spot instance siacoin and monero cryptocurrency miners.☆18Feb 12, 2018Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Jan 22, 2017Updated 9 years ago
- A tool to spider Github or search URLs for various information leaks☆33May 22, 2023Updated 2 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Python-powered Bitcoin Faucet Script☆14Dec 8, 2022Updated 3 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- DJI Duml Packet Parser☆11Sep 23, 2018Updated 7 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- Simple console based Windows key-logger created in C++☆15Nov 5, 2021Updated 4 years ago
- A bash script to easily run TOR hidden service on termux and most linux distros☆51Jul 6, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Show the marketplace profile from FB☆12May 4, 2022Updated 4 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆20Jul 14, 2022Updated 3 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- Program bypasses the UAC prompt for Admin privileges when running a program.☆16Nov 24, 2023Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- 相册选择器,快速,低耗,响应快速,无依赖☆10Sep 22, 2016Updated 9 years ago
- multi faucet free 2☆15Jan 16, 2022Updated 4 years ago