Resources for our (extended) version of our IMC Crypto-Mining Malware paper
☆34Dec 10, 2019Updated 6 years ago
Alternatives and similar repositories for cryptomining-malware
Users that are interested in cryptomining-malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Mar 19, 2018Updated 8 years ago
- A Linux Cyptomining malware☆38May 5, 2023Updated 3 years ago
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- Blocker Hacks☆15Apr 8, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- a simple hidden silent XMR miner.☆188Jan 26, 2019Updated 7 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated last year
- How to create a valid polyglot HTML/JS/WebAssembly module -☆12Oct 15, 2020Updated 5 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Farm-to-table, organic, handcrafted, delicious Webassembly☆15Dec 7, 2021Updated 4 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆29Nov 30, 2025Updated 5 months ago
- Firmware Tools framework☆10Aug 17, 2016Updated 9 years ago
- ☆24Mar 30, 2022Updated 4 years ago
- ☆28Sep 16, 2020Updated 5 years ago
- Monero/Cryptonight mining Android app. Based on upost codes.☆21Mar 22, 2019Updated 7 years ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Sep 7, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A specific SSDP Scanner for the SSDP Attack Script☆11Sep 6, 2014Updated 11 years ago
- Project HMS☆10Jun 11, 2018Updated 7 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 12 years ago
- Code for our 2023 IEEE S&P Paper "The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web"☆15Dec 12, 2024Updated last year
- A server building plugins for BTCPay Server☆25May 1, 2026Updated last week
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- ☆17Apr 17, 2023Updated 3 years ago
- Repository of files for independent anti-phishing campaign, trusted information and more☆10May 14, 2020Updated 5 years ago
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆13May 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🦎 Prototypes on polymorphic, metamorphic and poly-metamorphic malwares in Rust 🦎☆14Oct 8, 2023Updated 2 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Generated random UserAgent for any browser and os and scrap new proxy ip (auto update)☆13Nov 23, 2024Updated last year
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆22Oct 13, 2020Updated 5 years ago
- An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy☆14Oct 23, 2024Updated last year
- ☆16Feb 20, 2020Updated 6 years ago
- SoundCloud play generator bot. Get unlimited plays on your tracks.☆14Updated this week