christoftorres / Crypto-Mining-MalwareView external linksLinks
An analysis on cryptocurrency mining malware embedded via JavaScript.
☆14Mar 19, 2018Updated 7 years ago
Alternatives and similar repositories for Crypto-Mining-Malware
Users that are interested in Crypto-Mining-Malware are comparing it to the libraries listed below
Sorting:
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆33Dec 10, 2019Updated 6 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆26Aug 18, 2024Updated last year
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Jan 31, 2019Updated 7 years ago
- Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)☆25Jun 3, 2020Updated 5 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- A minimal SDK that lets an integrator add a Monero Miner using the Javascript miner created by CoinHive. The Monero Miner can be used wit…☆26Jul 27, 2018Updated 7 years ago
- API hooking and code injection made easy!☆40Aug 22, 2023Updated 2 years ago
- List of payloads for BurpSuite intruder. Payloads gathered from Swisskyrepos PayloadsAllTheThings☆36Jan 3, 2026Updated last month
- Displays your crypto coin balance across multiple exchanges☆15Jan 8, 2018Updated 8 years ago
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- use at your own risk☆37Nov 23, 2019Updated 6 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- GNTL Project Documentation☆12Apr 9, 2021Updated 4 years ago
- XELIS documentation website☆11Feb 1, 2026Updated last week
- 一个基于JSRPC实现的自动解密代理框架☆13Sep 28, 2023Updated 2 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- Android backdoored app, improved source code of msfvenom android .apk☆12May 31, 2019Updated 6 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- Complete Automated pentest framework for Information Gathering☆43Dec 2, 2019Updated 6 years ago
- Android Miner by bitcoin nova☆37Mar 20, 2018Updated 7 years ago
- ☆12Apr 26, 2022Updated 3 years ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- Simple tool to view all passwords of WiFi networks saved in Windows☆12Sep 7, 2025Updated 5 months ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 11 years ago
- Android 脱壳☆14Mar 23, 2022Updated 3 years ago
- ☆13Jul 26, 2025Updated 6 months ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆12Dec 8, 2025Updated 2 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆12Dec 25, 2020Updated 5 years ago
- ☆12May 12, 2019Updated 6 years ago
- ☆11Dec 13, 2021Updated 4 years ago