nekrutnikolai / minerwranglerLinks
A bundle of bash scripts to make headless crypto mining on linux a simple reality. Unfortunately only NVIDIA support for now.
☆18Updated 4 years ago
Alternatives and similar repositories for minerwrangler
Users that are interested in minerwrangler are comparing it to the libraries listed below
Sorting:
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 3 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆11Updated 5 years ago
- ☆15Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last month
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- Repository of tools used in my blog☆51Updated last year
- Tools for attacking various MIFARE RFID cards☆15Updated 6 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆25Updated 5 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Updated 4 years ago
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆13Updated 3 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Updated 3 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆56Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 4 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- ☆14Updated 9 months ago
- VLAN attacks toolkit☆12Updated 3 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆15Updated 9 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Standardizing Security Titles☆13Updated last week