cystack / monero-mining-malware
☆13Updated 7 years ago
Alternatives and similar repositories for monero-mining-malware:
Users that are interested in monero-mining-malware are comparing it to the libraries listed below
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆20Updated 9 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- ☆89Updated 8 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Updated 7 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆46Updated last year
- A tool for recover router password☆30Updated 6 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 7 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated 2 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- (harmless) mirai botnet client☆14Updated 8 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Random stuff☆16Updated 6 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Automated Cyber Offense☆89Updated 6 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆45Updated 3 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago