Resources for our (extended) version of our IMC Crypto-Mining Malware paper
☆33Dec 10, 2019Updated 6 years ago
Alternatives and similar repositories for cryptomining-malware
Users that are interested in cryptomining-malware are comparing it to the libraries listed below
Sorting:
- Blocker Hacks☆15Apr 8, 2022Updated 3 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 10 months ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- ☆14Dec 22, 2017Updated 8 years ago
- BlackVenom is a personal project designed for ethical ARP and DNS spoofing 🛡️. It helps cybersecurity professionals practice network tra…☆23Jun 21, 2025Updated 8 months ago
- A Linux Cyptomining malware☆38May 5, 2023Updated 2 years ago
- Monero/Cryptonight mining Android app. Based on upost codes.☆21Mar 22, 2019Updated 6 years ago
- ☆19Jun 7, 2021Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Run a desktop enviornment in GitHub codespaces☆10Jan 7, 2025Updated last year
- ☆16Apr 20, 2024Updated last year
- ☆28Sep 16, 2020Updated 5 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- A minimal SDK that lets an integrator add a Monero Miner using the Javascript miner created by CoinHive. The Monero Miner can be used wit…☆26Jul 27, 2018Updated 7 years ago
- Bitcoin Hush☆12Apr 29, 2020Updated 5 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆40Sep 16, 2021Updated 4 years ago
- ☆17Jun 10, 2025Updated 8 months ago
- Fetches YouTube Premium codes from Discord Inventory using tokens (supports bulk)☆11Jun 22, 2022Updated 3 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- ☆10Aug 9, 2024Updated last year
- ☆13Mar 3, 2023Updated 3 years ago
- a simple hidden silent XMR miner.☆193Jan 26, 2019Updated 7 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42May 18, 2024Updated last year
- Very simple and fast Minecraft server status library using the Server List Ping protocol☆11Feb 12, 2023Updated 3 years ago
- A krunker.io modification☆10Jan 21, 2020Updated 6 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- 逃离叙事:加密思潮十日谈☆11Updated this week
- Android backdoored app, improved source code of msfvenom android .apk☆12May 31, 2019Updated 6 years ago
- streamlit_dash_gen☆16Jun 14, 2025Updated 8 months ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- Remove the Telegram deleted account members from your destination group☆10Oct 14, 2025Updated 4 months ago