A simple Cryptojacking malware made with Go and XMRig, for educational purposes only.
☆20Apr 19, 2020Updated 6 years ago
Alternatives and similar repositories for Minemole
Users that are interested in Minemole are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A malicious access point that injects mining scripts on the fly.☆16Dec 7, 2020Updated 5 years ago
- A automated monero mining (injector) scripts which mines monero for you in targeted system☆76Jul 29, 2024Updated last year
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- acunetix 13 crack by mtd☆14Feb 29, 2020Updated 6 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41May 18, 2022Updated 4 years ago
- ☆14Mar 15, 2020Updated 6 years ago
- Starting point for a mono repo☆13Aug 22, 2022Updated 3 years ago
- This application was created as a POC for how to scan your local network traffic for HTTP requests and then inject various javascript cry…☆84Aug 23, 2020Updated 5 years ago
- Build a list of pages that use the Anomaly Classification System (ACS) on the SCP Wiki☆12Jul 20, 2023Updated 2 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 3 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- binary file editor☆18Aug 19, 2025Updated 9 months ago
- Validate proxies for specific domain☆39Aug 14, 2021Updated 4 years ago
- WireGuard client for PacketFence ZTNA☆11Apr 26, 2021Updated 5 years ago
- Node, TS, Typeorm, Postgres, Express, Stripe, Auth0, Tailwind, Amplitude, and tagged template literals set up to run on Heroku☆12Feb 9, 2022Updated 4 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Sep 18, 2020Updated 5 years ago
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 3 years ago
- Zero Trust Network Framework☆10Sep 29, 2019Updated 6 years ago
- Gui uart and i2c for FT260(https://www.ftdichip.com/Products/ICs/FT260.html)☆16May 20, 2020Updated 5 years ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Python implmentation of Alcubierre's metric using Numpy and Matplotlib.☆13Feb 6, 2024Updated 2 years ago
- CVE-2021-33766-poc☆10Sep 15, 2021Updated 4 years ago
- IoT device scanner.☆41Aug 19, 2019Updated 6 years ago
- A script to access someone's webcam by sharing a link.☆10May 3, 2020Updated 6 years ago
- A proving grounds for young and aspiring BBOT modules☆15Apr 1, 2026Updated last month
- Password and email checker. It is your password or email compromissed? Check it now!☆10Dec 8, 2022Updated 3 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- This script is written in Solidity and Python3, it allows you to sell Honeypot tokens despite broken TransferFrom function.☆13Jan 28, 2022Updated 4 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 13, 2026Updated last month
- Side Yard, an open-source platform where you can sell, donate, or collaborate on side projects. Whether you're a developer, designer, wri…☆16Sep 26, 2023Updated 2 years ago
- Bitcoin address changer. It changes the clipboard depending of the pubkey.☆10Sep 12, 2021Updated 4 years ago
- Extract username and passwords from IPTV urls☆13Nov 8, 2025Updated 6 months ago
- ☆15Dec 13, 2022Updated 3 years ago
- CVE-2020-10204 远程命令执行脚本☆13May 27, 2020Updated 5 years ago