An analysis on cryptocurrency mining malware embedded via JavaScript.
☆14Mar 19, 2018Updated 8 years ago
Alternatives and similar repositories for Crypto-Mining-Malware
Users that are interested in Crypto-Mining-Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository will only hold issues around various Tools to be bundled in AndroidTamer☆12May 2, 2016Updated 9 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Script to install pentest tools on Alpine Linux☆12Jul 3, 2015Updated 10 years ago
- some python3 functions to add spreading features to any python backdoor☆56Jan 22, 2017Updated 9 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- Automatically load stolen cookies from ChromePass☆27Mar 19, 2021Updated 5 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- A tool to copy only the changed files to a new folder, useful to create incremental update packages.☆11Jan 27, 2022Updated 4 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Plugin for Recaf, which allows you to no-op methods with a single click.☆17May 22, 2021Updated 4 years ago
- A web based client for Foscam IP cameras (and possibly others)☆13Feb 14, 2014Updated 12 years ago
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated last year
- This script allow to scrape shodan.io IoT search engine and get devices IP without using your search or download credit!☆12May 26, 2021Updated 4 years ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆13Jan 9, 2026Updated 3 months ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Malware Analysis Tools☆33Oct 26, 2019Updated 6 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- Relay Node for the Tox Network☆10Jan 1, 2018Updated 8 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- Wait...☆31Mar 6, 2021Updated 5 years ago
- Complete Automated pentest framework for Information Gathering☆43Dec 2, 2019Updated 6 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 7 years ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- Android hacking tools☆14Apr 25, 2010Updated 15 years ago
- Spike Fuzzer ( Spike for Archlinux ) && Audits☆11Jul 6, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- XELIS documentation website☆11Mar 29, 2026Updated 2 weeks ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- API hooking and code injection made easy!☆40Aug 22, 2023Updated 2 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- ☆12Aug 1, 2023Updated 2 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆47Nov 1, 2022Updated 3 years ago
- Batch NetWork Worm with Download & Execute Payload☆11May 26, 2020Updated 5 years ago