Resources for our (extended) version of our IMC Crypto-Mining Malware paper
☆33Dec 10, 2019Updated 6 years ago
Alternatives and similar repositories for cryptomining-malware
Users that are interested in cryptomining-malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 8 years ago
- ☆14Dec 22, 2017Updated 8 years ago
- A Linux Cyptomining malware☆38May 5, 2023Updated 2 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- Blocker Hacks☆15Apr 8, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- A python library for working with the Liber Primus☆18Jun 14, 2025Updated 9 months ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- a simple hidden silent XMR miner.☆194Jan 26, 2019Updated 7 years ago
- How to create a valid polyglot HTML/JS/WebAssembly module -☆12Oct 15, 2020Updated 5 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- A part of the project to detect Magisk on an Android device☆11May 13, 2019Updated 6 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- ☆21Jun 28, 2023Updated 2 years ago
- ☆23Mar 30, 2022Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Monero/Cryptonight mining Android app. Based on upost codes.☆21Mar 22, 2019Updated 7 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- A specific SSDP Scanner for the SSDP Attack Script☆11Sep 6, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆14Dec 12, 2024Updated last year
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- the swiss army knife in the hash field. fast, reliable and easy to use☆24Feb 7, 2024Updated 2 years ago
- Project HMS☆10Jun 11, 2018Updated 7 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Repository of files for independent anti-phishing campaign, trusted information and more☆10May 14, 2020Updated 5 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Jul 4, 2023Updated 2 years ago
- A barebones utility for metamorphic testing in Rust☆19Oct 22, 2019Updated 6 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A powerful, recursive URL-smart web scraping tool designed to efficiently collect and organize content from websites. This tool is perfec…☆10Mar 6, 2026Updated 3 weeks ago
- A modern UI theme for MeshCentral, enhancing the default interface with improved responsiveness, refined layouts, and consistent design e…☆50Mar 18, 2026Updated last week
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Jan 26, 2021Updated 5 years ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago
- Relay Node for the Tox Network☆10Jan 1, 2018Updated 8 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- ☆13Dec 28, 2024Updated last year