cystack / monero-mining-malwareLinks
☆13Updated 7 years ago
Alternatives and similar repositories for monero-mining-malware
Users that are interested in monero-mining-malware are comparing it to the libraries listed below
Sorting:
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆32Updated 9 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- CVE-2017-0785 BlueBorne PoC☆40Updated 7 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆20Updated 9 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Updated 12 years ago
- Malicious Software SRC Extract☆73Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- a simple, barely functional, prototyping RAT (Remote Administration Tool)☆9Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Updated 7 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- DEScrypt CPU Collision Cracker☆50Updated 6 years ago