christoftorres / Crypto-Mining-Malware
An analysis on cryptocurrency mining malware embedded via JavaScript.
☆12Updated 6 years ago
Alternatives and similar repositories for Crypto-Mining-Malware:
Users that are interested in Crypto-Mining-Malware are comparing it to the libraries listed below
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆22Updated 7 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Random stuff☆16Updated 6 years ago
- ☆15Updated 2 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ☆19Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Updated 10 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- pen testing scripts☆11Updated 4 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago