gsuareztangil / cryptomining-malwareLinks
Resources for our (extended) version of our IMC Crypto-Mining Malware paper
☆32Updated 5 years ago
Alternatives and similar repositories for cryptomining-malware
Users that are interested in cryptomining-malware are comparing it to the libraries listed below
Sorting:
- A Linux Cyptomining malware☆37Updated 2 years ago
- Build a Mirai botnet from the source code.☆42Updated 6 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆98Updated 7 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆145Updated 6 years ago
- Ransomeware☆46Updated 7 years ago
- Carbanak leaked source☆74Updated 7 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆46Updated 2 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆31Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- enemy SSH Telnet IoT botnet☆60Updated 3 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆32Updated 7 years ago
- Demonstrate about file-less malware approach using JavaScript☆55Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Mass malicious script dump/Malware src dump☆16Updated 8 years ago
- ☆41Updated 7 years ago
- RAT Museum☆106Updated 2 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 4 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆74Updated 4 years ago
- FUZZBUNCH - NSA security tools☆76Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- Exploit Pack - Project☆71Updated 5 years ago
- This repository contains a curated list of papers, articles and other sources related to remote access trojans.☆43Updated 2 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆17Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆97Updated 4 years ago
- iOS malware samples☆43Updated 9 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆24Updated 4 years ago