hackerhouse-opensource / MoneroMinerView external linksLinks
A high-performance Monero (XMR) mining implementation in C++ using the RandomX algorithm. This miner is optimized for modern CPUs and provides efficient mining capabilities with a simple command-line interface.
☆52Feb 2, 2026Updated last week
Alternatives and similar repositories for MoneroMiner
Users that are interested in MoneroMiner are comparing it to the libraries listed below
Sorting:
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Nov 27, 2025Updated 2 months ago
- Heap encryption in Nim☆20Aug 25, 2024Updated last year
- rust port of pspy with support for process monitoring over dbus☆35Jan 4, 2026Updated last month
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆78Feb 6, 2026Updated last week
- AV/EDR killer using BYOVD technique☆43Sep 27, 2024Updated last year
- High performance async Mssql library for Python.☆16Updated this week
- 🐆A lightweight, high-performance string manipulation library optimized for speed-sensitive applications.☆14Jan 6, 2026Updated last month
- A collection of PoCs to do common things in unconventional ways☆122Aug 31, 2025Updated 5 months ago
- Educational proof-of-concept demonstrating DEP/NX bypass using hardware breakpoints, vectored exception handling, and instruction emulati…☆98Oct 17, 2025Updated 3 months ago
- The SEAL-CPU backend is a Reference backend engine for HEBench which is a shared library that implements the required functions specified…☆11Mar 3, 2023Updated 2 years ago
- A batched implementation for efficient Qwen2.5-VL inference.☆22Jul 16, 2025Updated 6 months ago
- 🚨 Generate and explore malicious QR codes for cybersecurity education and authorized penetration testing to enhance digital security awa…☆26Updated this week
- Sparse Matrix Factorization (SMF) is a key component in many machine learning problems and there exist a verity a applications in real-w…☆11Jan 25, 2016Updated 10 years ago
- ☆12Dec 10, 2023Updated 2 years ago
- ☆10Jul 8, 2024Updated last year
- A curated collection of practical Laravel tips, tricks, and best practices to help you write cleaner, faster, and more efficient code. Wh…☆10Apr 13, 2025Updated 10 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Dec 4, 2023Updated 2 years ago
- Simple readonly FUSE driver for FAT filesystems☆12Jan 27, 2016Updated 10 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- Optimizing loading training data from cloud bucket storage for cloud-based distributed deep learning. Official repository for Quantifying…☆11Jan 1, 2022Updated 4 years ago
- Incremental optimizations to the N-Body problem in order to evaluate and compare the performance of Python translators in the HPC environ…☆13Apr 2, 2023Updated 2 years ago
- This repo offers a tool to reveal password encrypted by Royal TS.☆16Jan 23, 2020Updated 6 years ago
- DLL Unhooking☆13Mar 26, 2021Updated 4 years ago
- Interact with Windows RPC Services over SMB using go-smb☆11Nov 18, 2025Updated 2 months ago
- A Simple heaptrack-compatible Heap Profiler for Windows C/C++ Applications☆12Jun 28, 2015Updated 10 years ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 2 months ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- 💾 Optimize Laravel caching with Cachetastic! Cache method results, force refresh, handle errors, and boost app performance effortlessly.☆13Jan 26, 2026Updated 2 weeks ago
- MSVC C++ resource example☆11Jun 28, 2018Updated 7 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Exploring Methods of Protecting Confidential Erlang Workloads with Intel SGX☆12Jun 19, 2020Updated 5 years ago
- Backpack Attachments is a FiveM resource for attaching weapons and items to players' backs. It supports customizable attachment points, h…☆10Nov 14, 2024Updated last year
- The High Performance Collision Cross Section (HPCCS) is a new software for fast and accurate calculation of CCS for molecular ions. Based…☆17May 11, 2020Updated 5 years ago
- Library and tools to access the GUID Partition Table (GPT) volume system format☆11Dec 20, 2025Updated last month
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- This workshop teaches systematic approaches to evaluating Generative AI workloads for production use. You'll learn to build evaluation fr…☆26Jan 30, 2026Updated 2 weeks ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 2 months ago