A CRYPTOJACKING PROGRAM (MALWARE) >:)
☆40Sep 16, 2021Updated 4 years ago
Alternatives and similar repositories for cryptojack
Users that are interested in cryptojack are comparing it to the libraries listed below
Sorting:
- A automated monero mining (injector) scripts which mines monero for you in targeted system☆72Jul 29, 2024Updated last year
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- A minimal SDK that lets an integrator add a Monero Miner using the Javascript miner created by CoinHive. The Monero Miner can be used wit…☆26Jul 27, 2018Updated 7 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12May 31, 2024Updated last year
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- A malicious access point that injects mining scripts on the fly.☆16Dec 7, 2020Updated 5 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year
- ⛏️ A simple page to mine monero using Coin hive☆22Sep 7, 2020Updated 5 years ago
- Totem maltego transform☆29Sep 23, 2020Updated 5 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- 💣 Impulse Denial-of-service ToolKit☆30Oct 17, 2020Updated 5 years ago
- Anubis 7.0☆27Sep 28, 2024Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- A Simple Miner to Mine Cryptocurrencies using CoinImp in Node.js☆61Mar 7, 2018Updated 7 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- Subdomain Bruteforce - Bounty Quick Code☆31Sep 6, 2024Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆34Feb 2, 2026Updated 3 weeks ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Sep 22, 2017Updated 8 years ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Updated this week
- ☆10Aug 9, 2024Updated last year
- An full-stack eCommerce store web application in nodejs☆11Jun 6, 2024Updated last year
- ☆13Aug 28, 2025Updated 6 months ago
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆33Dec 10, 2019Updated 6 years ago
- Ransomware Decryptors☆36Apr 28, 2022Updated 3 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago