gexxxter / coinHiveMinerLinks
Small UI for the https://coin-hive.com/ mining API
☆24Updated 6 years ago
Alternatives and similar repositories for coinHiveMiner
Users that are interested in coinHiveMiner are comparing it to the libraries listed below
Sorting:
- Deprecated. Use CoinHive Stratum instead.☆35Updated 7 years ago
- A nice friendly simple and easly customizable GUI for coinhives javascript miner to embed onto websites so users of your site can interac…☆72Updated 2 years ago
- ⛏️ A simple page to mine monero using Coin hive☆22Updated 5 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Updated 8 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆84Updated 4 years ago
- A curated list of free public proxy servers☆72Updated 6 years ago
- OpenBank - Your BTC realtime tracker.☆74Updated 2 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- 💰 JavaScript miner for the cryptocurrency Monero Blockchain (XMR) using Coin-Hive☆49Updated 6 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- Open Source Torrent Index Website☆22Updated 8 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆17Updated 12 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- ☆27Updated 8 years ago
- misc scripts☆21Updated 4 months ago
- This class can be used to retrieve remote Web pages using the TOR network. It can connect to an HTTP proxy server that accesses the TOR …☆53Updated 13 years ago
- A powerfull and awesome Keylogger(Your keyboard and your mouse) realy helpfull for hackers! :-P (C/C++)☆19Updated 5 years ago
- TOR Mail encrypted server for Hidden Services☆42Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Tool to check if an IP of a DblTek GoIP is vulnerable to a challenge-response login system, send SMS messages from the system, execute re…☆65Updated 5 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆70Updated 10 years ago
- Exploit Wordpress Plugin Revolution Slider - Unrestricted File Upload☆25Updated 9 years ago
- Build a search engine from nmap XML files☆20Updated 11 years ago
- Transplant adore rootkit for Android platform.☆37Updated 11 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago