An analysis on cryptocurrency mining malware embedded via JavaScript.
☆13Mar 19, 2018Updated 8 years ago
Alternatives and similar repositories for Crypto-Mining-Malware
Users that are interested in Crypto-Mining-Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The PoC implementations for the Android code packing technique.☆14Jul 24, 2016Updated 9 years ago
- This repository will only hold issues around various Tools to be bundled in AndroidTamer☆12May 2, 2016Updated 10 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- Frida depends on V8☆13Aug 9, 2022Updated 3 years ago
- Project OPEN SOURCE Miner DogeCOIN in Broswer (CoinHIVE)☆15Feb 15, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆25May 1, 2017Updated 9 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Dec 13, 2023Updated 2 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- Shamir Secret Sharing for Nim☆10May 28, 2021Updated 4 years ago
- All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs☆10Nov 21, 2022Updated 3 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)☆24Jun 3, 2020Updated 5 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Dec 19, 2019Updated 6 years ago
- A tool to copy only the changed files to a new folder, useful to create incremental update packages.☆11Jan 27, 2022Updated 4 years ago
- A web based client for Foscam IP cameras (and possibly others)☆13Feb 14, 2014Updated 12 years ago
- Wordlists generated over the years of penetration testing☆13Mar 18, 2025Updated last year
- Search for leaked creadentials on pwndb using the command line and tor.☆25Jan 31, 2019Updated 7 years ago
- This script allow to scrape shodan.io IoT search engine and get devices IP without using your search or download credit!☆12May 26, 2021Updated 4 years ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆12Jan 9, 2026Updated 3 months ago
- A web spider for shodan.io without using the Developer API.☆34Jan 4, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- carbanak\group_ib_smart_boys☆11Jul 12, 2018Updated 7 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- ☆14Jan 24, 2023Updated 3 years ago
- Linux assembly language minimal 'dynamic ELF' example plus experiments☆25May 22, 2020Updated 5 years ago
- Relay Node for the Tox Network☆10Jan 1, 2018Updated 8 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- ☆14Dec 22, 2017Updated 8 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- Wait...☆31Mar 6, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 7 years ago
- Show AV Processes list☆15Sep 30, 2020Updated 5 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated 2 years ago
- Spike Fuzzer ( Spike for Archlinux ) && Audits☆11Jul 6, 2019Updated 6 years ago