Souhardya / MinerHavocLinks
Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials
☆48Updated 3 years ago
Alternatives and similar repositories for MinerHavoc
Users that are interested in MinerHavoc are comparing it to the libraries listed below
Sorting:
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- Capstone: Keylogger Trojan☆34Updated 7 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated last year
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- Kill Any Antivirus Using Python For Windows Users .☆47Updated 9 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31Updated 8 years ago
- A ctypes powered python keylogger.☆107Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 9 years ago
- Phishing webapp generator☆42Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- A Linux Cyptomining malware☆38Updated 2 years ago
- Python backdoor that uses http post/get requests to communicate☆42Updated 9 years ago
- SQLi Tool/SQL Injection/Hijacker☆44Updated 9 years ago
- Better Remote Access Trojan☆51Updated 9 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 10 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Mirai Botnet DB Project☆26Updated 6 years ago
- Small backdoor using cookie.☆63Updated 9 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆51Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Random stuff☆16Updated 7 years ago