collaborative (mitm) cryptocurrency mining pool in wifi networks
☆1,079Jan 9, 2019Updated 7 years ago
Alternatives and similar repositories for coffeeMiner
Users that are interested in coffeeMiner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CoinHive cryptocurrency miner for node.js☆2,078Dec 18, 2018Updated 7 years ago
- deepMiner webminer proxy (update for cryptoNight R)☆558Mar 21, 2019Updated 7 years ago
- Extract Silently WiFi Passwords By Mail & USB☆19Dec 4, 2021Updated 4 years ago
- Inject code and spy on wifi users☆2,618Jul 31, 2021Updated 4 years ago
- Automated Mass Exploiter☆5,227May 22, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Hidden miner builder☆119Jun 23, 2022Updated 3 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆751Sep 1, 2022Updated 3 years ago
- Cloak can backdoor any python script with some tricks.☆504May 5, 2019Updated 6 years ago
- Detecting malicious WiFi with mining cryptocurrency.☆50Mar 16, 2018Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Termux Script Auto Claim Bonus Ghs From Cryptoplace Mining☆31Sep 1, 2021Updated 4 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆38Mar 24, 2014Updated 12 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Mar 22, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PoC scripts demonstrating the BlueBorne vulnerabilities☆611May 17, 2021Updated 4 years ago
- Framework for Man-In-The-Middle attacks☆3,636Aug 28, 2018Updated 7 years ago
- Python antivirus evasion tool☆1,450Oct 21, 2023Updated 2 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆49Feb 8, 2020Updated 6 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Aug 29, 2021Updated 4 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,156Apr 18, 2020Updated 5 years ago
- Hack any Instagram account through bruteforce.☆11Sep 24, 2021Updated 4 years ago
- Arduino Rubber Ducky Framework☆107Apr 29, 2019Updated 6 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆294Feb 28, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python botnet and backdoor☆1,618Mar 2, 2023Updated 3 years ago
- Share wifi on windows with arranged password like every hour or every day☆14Feb 4, 2017Updated 9 years ago
- Tool for advanced mining for content on Github☆2,153Nov 5, 2025Updated 4 months ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆335Mar 6, 2019Updated 7 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 10 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Dec 9, 2017Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Mar 10, 2023Updated 3 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Remote Access Trojan(RAT), Miner, DDoS☆393Dec 24, 2016Updated 9 years ago
- HTTP Botnet☆920Oct 27, 2020Updated 5 years ago
- Team Cymru IP to ASN command line tool☆13Updated this week
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,957Mar 22, 2024Updated 2 years ago
- a simple hidden silent XMR miner.☆193Jan 26, 2019Updated 7 years ago