dangoldin / crypto-miner-hack
Dump of the crypto-miner that got installed on my system
☆14Updated 4 years ago
Alternatives and similar repositories for crypto-miner-hack:
Users that are interested in crypto-miner-hack are comparing it to the libraries listed below
- A tool for quickly evaluating IAM permissions in AWS.☆73Updated 10 months ago
- An Open Letter to the OWASP Board☆106Updated last year
- Sample code for finding AWS Account ID of an S3 bucket.☆50Updated last year
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆134Updated 2 months ago
- markdown friendly page for my viewers☆37Updated 8 months ago
- A fast GitHub stargazers information gathering tool☆73Updated 3 years ago
- ☆18Updated 5 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆48Updated last month
- Honeyscanner: A vulnerability analyzer for honeypots☆37Updated 7 months ago
- 🐠 A simple Google query builder for document file discovery☆26Updated last year
- Privilege escalation in Docker☆29Updated 2 years ago
- An experimental AntiBot, AntiCrawl reverse proxy for serving simple static content.☆52Updated 6 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Modular web-application honeypot platform built using go and gin☆57Updated 10 months ago
- Pentesting post exploitation tool for slack☆20Updated 6 months ago
- I left a text field form on my site no one could see.☆72Updated last year
- A meta-database collecting resources that compile lists of breaches☆18Updated 4 months ago
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆144Updated 6 months ago
- A very high-speed, configurable, and portable packet-crafting utility optimized for embedded devices☆74Updated 2 months ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Updated last month
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 4 years ago
- Check whether an IP address or hostname belongs to popular cloud providers☆58Updated this week
- Writing a container in a few lines of Go code, as seen at DockerCon 2017 and on O'Reilly Safari☆40Updated 4 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆70Updated last year
- ☆109Updated 7 months ago
- ☆21Updated 3 years ago
- Let's brute force this hotel's tv.☆77Updated 5 years ago
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆26Updated 6 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆73Updated last month
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago