cystack / monero-mining-malwareLinks
☆14Updated 7 years ago
Alternatives and similar repositories for monero-mining-malware
Users that are interested in monero-mining-malware are comparing it to the libraries listed below
Sorting:
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆47Updated 3 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- Capstone: Keylogger Trojan☆35Updated 7 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆29Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆20Updated 9 years ago
- Broadpwn bug (CVE-2017-9417)☆52Updated 8 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Updated 13 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Graphical user interface for the windows version of THC Hydra☆55Updated 7 years ago
- ☆90Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 11 years ago
- Application to take over mining destination of remote cgminer instances via RPC interface.☆24Updated 9 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- A tool for recover router password☆30Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Updated 8 years ago
- Some NSE scripts to search information from routers☆35Updated 9 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Open Source trojan for android.☆21Updated last year
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 7 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago