alfonmga / hiding-cryptominers-linux-rootkit
Linux rootkit POC to hide a crypto miner's process and CPU usage.
☆72Updated last year
Alternatives and similar repositories for hiding-cryptominers-linux-rootkit:
Users that are interested in hiding-cryptominers-linux-rootkit are comparing it to the libraries listed below
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆43Updated 7 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 3 years ago
- Antivirus Signature Search Toolkit☆79Updated last year
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆46Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆177Updated 2 years ago
- Just an older botnet☆14Updated 4 years ago
- ☆36Updated 3 years ago
- 🔑 Open source stealer written on C#, all logs will be sent to Telegram bot.☆66Updated 2 years ago
- enemy SSH Telnet IoT botnet☆60Updated 2 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆109Updated 3 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆32Updated 2 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆63Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Decentralised P2P botnet using toxcore.☆170Updated 2 years ago
- A Linux worm targeting vulnerable IoT devices with MMU. Reengineered from/inspired by Mirai botnet.☆18Updated 2 years ago
- Hybrid Botnet over TOR targeting Linux machines☆11Updated 3 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆30Updated 2 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- A nearly undetectable reverse HTTPS Botnet+RAT C2 Handler and Client written in Go☆121Updated last year
- JS Jscript - download file from url then run it☆59Updated 4 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆23Updated 2 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 3 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆95Updated 5 months ago
- A C2 project that controls a self-propagating MS17-010 worm.☆68Updated 3 years ago