Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encrypting Minecraft worlds, and phishing players who connect.
☆17Dec 23, 2024Updated last year
Alternatives and similar repositories for minegrief
Users that are interested in minegrief are comparing it to the libraries listed below
Sorting:
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Dec 23, 2024Updated last year
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 8 months ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- Permanently disable EDRs as local admin☆127Dec 19, 2025Updated 2 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Mar 2, 2024Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Jun 10, 2025Updated 8 months ago
- CVE-2023-0297: The Story of Finding Pre-auth RCE in pyLoad☆28Jan 14, 2023Updated 3 years ago
- ☆38Jan 7, 2025Updated last year
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- WhatsCloud is an android app which allows you to analyze your WhatsApp chat history on the fly with only one click☆12Jul 29, 2019Updated 6 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- ☆12Jun 26, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Exploit for CVE-2024-27198 - TeamCity Server☆36Dec 19, 2024Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 3 months ago
- ☆42Feb 18, 2025Updated last year
- Blockchain Reader Library☆10Jan 20, 2024Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- This is a collection of stealers for educational purposes☆21Aug 13, 2025Updated 6 months ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Fastest way to modify system wide DNS☆14Jun 10, 2025Updated 8 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- A sexy binary protocol written in c with zero-allocations☆11Dec 13, 2025Updated 2 months ago
- Data structure libraries in C.☆13Apr 19, 2022Updated 3 years ago
- 🌟Implementation of graph modeling in peer-to-peer (P2P) networks utilizing blockchain technology via WebSocket protocols.☆15Nov 12, 2025Updated 3 months ago
- ☆10Feb 11, 2025Updated last year
- C2 writen in Rust & Go powered by Tor network.☆152Oct 30, 2025Updated 4 months ago
- ☆108Oct 29, 2024Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆49Mar 11, 2025Updated 11 months ago