RansomFuck / MODRIGLinks
Monero (XMR) CPU miner
☆27Updated 7 years ago
Alternatives and similar repositories for MODRIG
Users that are interested in MODRIG are comparing it to the libraries listed below
Sorting:
- LiteHTTP is an HTTP bot that is being programmed in C#, on the .NET 2.0 dependency.☆196Updated 6 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆272Updated 2 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆328Updated 7 years ago
- PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)☆270Updated 7 years ago
- Simple python backdoor with Ngrok tunnel support☆206Updated last year
- Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service☆171Updated 6 years ago
- exp of CVE-2018-15982☆181Updated 6 years ago
- WebShell Dump☆177Updated 8 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆316Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Updated 8 years ago
- Port of eternal blue exploits to powershell☆150Updated 8 years ago
- injecting arbitrary codes in memory to bypass common antivirus solutions☆169Updated 8 years ago
- Learn from Casey Smith @subTee☆240Updated 8 years ago
- An Advanced C# .NET Rat, It’s Stable and Contains Many Features.☆269Updated 7 years ago
- Bind 2 exe's and have them run at the same time.☆47Updated 10 years ago
- PoC for CVE-2018-0802 And CVE-2017-11882☆168Updated 7 years ago
- A proof of concept for the RDP Inception Attack☆351Updated 8 years ago
- initial commit☆174Updated 7 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆118Updated 7 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Updated 7 years ago
- Totally anonymous botnet client with an emphasis on individual zombie control, resiliency of the host machine, and ease of remote code ex…☆18Updated 2 years ago
- complex webshell manager, quasi-http botnet.☆282Updated 10 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆167Updated 7 years ago
- VBScript obfuscation to allow PenTesters bypass countermeasures.☆124Updated 3 years ago
- Collection of Remote Administration Tool samples☆262Updated 10 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- A Simple Backdoor For Apache HTTP Server☆157Updated last year
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆266Updated 8 years ago
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on t…☆259Updated 4 years ago