cystack / monero-mining-malwareLinks
☆14Updated 8 years ago
Alternatives and similar repositories for monero-mining-malware
Users that are interested in monero-mining-malware are comparing it to the libraries listed below
Sorting:
- Automated Cyber Offense☆88Updated 6 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 8 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆31Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Updated 2 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Updated 4 years ago
- Capstone: Keylogger Trojan☆34Updated 7 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Updated 8 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Updated 3 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 7 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Updated 7 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- lulz: automated webstalking tool☆54Updated 9 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆38Updated 6 years ago
- Broadpwn bug (CVE-2017-9417)☆51Updated 8 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆21Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Open Source trojan for android.☆21Updated last year
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Graphical user interface for the windows version of THC Hydra☆55Updated 8 years ago