chebuya / minegriefLinks
Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encrypting Minecraft worlds, and phishing players who connect.
☆15Updated 8 months ago
Alternatives and similar repositories for minegrief
Users that are interested in minegrief are comparing it to the libraries listed below
Sorting:
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 9 months ago
- Proof-of-concept modular implant platform leveraging v8☆55Updated 5 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆35Updated 2 months ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆32Updated 5 months ago
- Simple reverse ICMP shell☆14Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆38Updated last month
- Quick test for CVE-2023-26025 behaviours☆12Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Use WordPress pingback.ping to transfer files.☆17Updated last year
- Presentaciones de congresos☆53Updated last year
- POC of GITHUB simple C2 in rust☆52Updated last month
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 5 months ago
- It's what all the kids are talking about☆12Updated 2 years ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆59Updated 8 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 4 months ago
- ☆57Updated 10 months ago
- Examples of various container types for Python and Golang☆14Updated last week
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆25Updated 3 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated 10 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆49Updated this week
- quASAR: ASAR manipulation made easy☆38Updated 2 years ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 5 months ago
- Nemesis agent for Mythic☆27Updated last year
- ☆35Updated 4 months ago
- Dumping LSA secrets: a story about task decorrelation☆14Updated last year
- Things i do because i saw it on twitter on a weekend☆28Updated last month