cystack / monero-mining-malware
☆13Updated 7 years ago
Alternatives and similar repositories for monero-mining-malware:
Users that are interested in monero-mining-malware are comparing it to the libraries listed below
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆12Updated 6 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 7 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- botnet scanner written in python☆8Updated 6 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆28Updated 10 years ago
- ☆15Updated 8 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated last year
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Updated 6 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆20Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆12Updated 12 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- Random stuff☆16Updated 6 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- Find infected ms17-010 machines☆12Updated 7 years ago
- Broadpwn bug (CVE-2017-9417)☆50Updated 7 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Updated 11 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago