A high-performance Monero (XMR) mining implementation in C++ using the RandomX algorithm. This miner is optimized for modern CPUs and provides efficient mining capabilities with a simple command-line interface.
☆62Mar 9, 2026Updated last month
Alternatives and similar repositories for MoneroMiner
Users that are interested in MoneroMiner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Living of the Land of Free SaaS☆72Mar 22, 2026Updated last month
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 5 months ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 11 months ago
- Powershell script that extracts and steals browser-saved passwords☆20Mar 13, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Heap encryption in Nim☆21Aug 25, 2024Updated last year
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆63Feb 2, 2026Updated 3 months ago
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆150Apr 15, 2026Updated 3 weeks ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 4 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆92Feb 16, 2026Updated 2 months ago
- Diebold Accuvote-TSx Election Machine Hacking☆41Feb 2, 2026Updated 3 months ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated 3 months ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆23Jun 12, 2023Updated 2 years ago
- Simple readonly FUSE driver for FAT filesystems☆12Jan 27, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A curated, verified list of AI-powered tools for smart contract and blockchain security☆68Apr 24, 2026Updated 2 weeks ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- A cognitive playbook for experienced smart contract auditors. Structures audit thinking, exploration, validation, and reporting. Not an a…☆40Jan 23, 2026Updated 3 months ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆51Feb 2, 2026Updated 3 months ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 4 years ago
- A collection of PoCs to do common things in unconventional ways☆122Aug 31, 2025Updated 8 months ago
- ☆46Oct 10, 2025Updated 6 months ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆31Apr 20, 2026Updated 2 weeks ago
- Papers, presentations and documents from the team at Hacker House.☆53Feb 2, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of menus from 2020 / 2021☆14Mar 5, 2023Updated 3 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 11 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆28Nov 26, 2025Updated 5 months ago
- AV/EDR killer using BYOVD technique☆45Sep 27, 2024Updated last year
- A simple, 100% Rust implementation of a vector storage database with on disk persistency.☆33Jul 5, 2024Updated last year
- ☆14Dec 5, 2024Updated last year
- HTTP Keyserver Protocol (HKP) handlers☆12Apr 25, 2018Updated 8 years ago
- Stop sending naked documents. Firemark watermarks images & PDFs in one command. Optimized to tackle AI watermark removal. Written in Rust…☆95Apr 10, 2026Updated 3 weeks ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆103Jan 10, 2026Updated 3 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆68Updated this week
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 6 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆109Apr 16, 2026Updated 3 weeks ago
- PolyEngine is an evasive PE packer designed for CTF challenges and low-level Windows security education. It focuses on bypassing EDR and …☆104Apr 29, 2026Updated last week
- Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https://awakened1712.github.io/hacking/hac…☆16Oct 23, 2019Updated 6 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago