gsuareztangil / cryptomining-malwareLinks
Resources for our (extended) version of our IMC Crypto-Mining Malware paper
☆32Updated 5 years ago
Alternatives and similar repositories for cryptomining-malware
Users that are interested in cryptomining-malware are comparing it to the libraries listed below
Sorting:
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆97Updated 7 years ago
- A Linux Cyptomining malware☆37Updated 2 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆46Updated 2 years ago
- ☆59Updated 8 years ago
- enemy SSH Telnet IoT botnet☆60Updated 3 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆32Updated 7 years ago
- Ransomeware☆46Updated 8 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆145Updated 6 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 4 years ago
- HTTP botnet☆60Updated 9 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- FUZZBUNCH - NSA security tools☆78Updated 8 years ago
- Malicious Software SRC Extract☆32Updated 2 years ago
- Build a Mirai botnet from the source code.☆42Updated 6 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆78Updated 2 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆46Updated 9 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Usefull scripts☆81Updated 7 years ago
- ☆53Updated 4 years ago
- iOS malware samples☆44Updated 9 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Updated 8 years ago
- A collection of malware samples.☆39Updated 7 years ago
- My favorite resources and tools for malware analysis.☆40Updated 5 years ago
- Exploit Pack - Project☆70Updated 5 years ago
- Community driven computer worm☆69Updated 3 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- A simple botnet that propagates via TELNET, controlled via IRC server, can execute shell commands and launch DDoS attacks☆15Updated 7 years ago