☆23Feb 25, 2026Updated 2 months ago
Alternatives and similar repositories for CryptoJack
Users that are interested in CryptoJack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Common Exercise Format - CEXF☆11Aug 15, 2024Updated last year
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- ☆11Aug 3, 2018Updated 7 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆21Oct 30, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆17Jun 20, 2023Updated 2 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- ☆19Oct 22, 2025Updated 6 months ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Automatically create iSCSI targets for all drives except for a boot device☆26May 23, 2025Updated 11 months ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- Ai000-Rostam (Codename: Ritchie Blackmoore) is a penetration testing tool for windows infrastructure that has been developing by Ai000 Cy…☆10Jun 2, 2024Updated last year
- Covert.io blog☆12Feb 3, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆135Dec 10, 2021Updated 4 years ago
- Offensive security toolkit for Claude Code☆146Apr 1, 2026Updated last month
- checks site content against known good ssdeep hash, identifies matches☆10Jun 2, 2019Updated 6 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- A telegram bot to create orders on FTX☆12Updated this week
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- ☆29Dec 26, 2025Updated 4 months ago
- ☆12Mar 10, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Prompt Injection Attacks against GPT-4, Gemini, Azure, Azure with Jailbreak☆30Oct 8, 2024Updated last year
- Salvator: The Saviour, When You Forget Birthdays☆10Dec 7, 2022Updated 3 years ago
- reverse engineer practice☆17Oct 13, 2019Updated 6 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 4 years ago
- ☆12Aug 10, 2024Updated last year
- Cryptocurrency Discovery and Triage Tool - Identify multiple cryptocurrency addresses and transactions from various wallet applications!☆23Apr 27, 2026Updated last week
- Exploits made by me☆12Jan 13, 2023Updated 3 years ago
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆45Jun 12, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Threat Mitigation Strategies☆29Feb 18, 2026Updated 2 months ago
- Deepsearch leak database client, as an alternative for pwndb☆15Dec 6, 2022Updated 3 years ago
- selenium with required binaries as one AWS Lambda Layer☆15Apr 9, 2021Updated 5 years ago
- ☆63Apr 4, 2024Updated 2 years ago
- 该项目为Shellocde加载器,详细介绍了我们如何绕过防病毒软件,以及该工具如何使用☆20Jun 22, 2022Updated 3 years ago
- ☆19Aug 10, 2021Updated 4 years ago
- A Proof Of Concept on how to integrate Splunk Cloud in a CICD pipeline☆13Apr 18, 2021Updated 5 years ago