cystack / monero-mining-malware
☆13Updated 7 years ago
Alternatives and similar repositories for monero-mining-malware:
Users that are interested in monero-mining-malware are comparing it to the libraries listed below
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆12Updated 7 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated 2 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- Broadpwn bug (CVE-2017-9417)☆50Updated 7 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- A tool for recover router password☆29Updated 6 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- dogecoin-mining botnet for windows☆15Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆13Updated 3 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago