nekrutnikolai / minerwranglerLinks
A bundle of bash scripts to make headless crypto mining on linux a simple reality. Unfortunately only NVIDIA support for now.
☆18Updated 4 years ago
Alternatives and similar repositories for minerwrangler
Users that are interested in minerwrangler are comparing it to the libraries listed below
Sorting:
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Collections of way to evade normal detection events.☆25Updated 4 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- A python based Framework for Ethical Hackers. Provides 6 different tools as of 31/01/2022.☆13Updated 2 years ago
- ☆13Updated 2 years ago
- Aircrack-ng Suite Scripts to Easily Demonstrate Wifi Attacks☆15Updated 4 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Offensive Linux tool for network attacks. Built from the ground with only C.☆15Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Sniffs sensitive data from interface or pcap☆15Updated 7 years ago
- Mobile phone PWN tools and scripts☆15Updated 4 years ago
- Build and Interact with a Set of Virtual Machines☆15Updated last week
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- ☆70Updated 6 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- another pwndb tool with more options☆15Updated 4 years ago
- A first look at browser-based Cryptojacking☆17Updated 7 years ago