gsuareztangil / cryptomining-malwareLinks
Resources for our (extended) version of our IMC Crypto-Mining Malware paper
☆32Updated 5 years ago
Alternatives and similar repositories for cryptomining-malware
Users that are interested in cryptomining-malware are comparing it to the libraries listed below
Sorting:
- A Linux Cyptomining malware☆36Updated 2 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆46Updated 2 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆44Updated 3 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143Updated 6 years ago
- Build a Mirai botnet from the source code.☆42Updated 6 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- The Open Tor Botnet (ZIB)☆32Updated 9 years ago
- Community driven computer worm☆68Updated 2 years ago
- FUZZBUNCH - NSA security tools☆76Updated 8 years ago
- enemy SSH Telnet IoT botnet☆61Updated 3 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆97Updated 7 years ago
- ☆58Updated 8 years ago
- Carbanak leaked source☆73Updated 7 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆14Updated 8 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆31Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆128Updated 3 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆32Updated 7 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆17Updated 4 years ago
- Exploit Pack - Project☆72Updated 5 years ago
- Android malware sample library.☆67Updated 3 years ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆23Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Demonstrate about file-less malware approach using JavaScript☆55Updated 8 years ago
- Personal research and publication on malware families☆140Updated 7 months ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆45Updated 9 years ago
- Ransomeware☆46Updated 7 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆114Updated 3 years ago