pbmartins / nyptoLinks
βοΈπ° Network monitoring solution to detect crypto-mining on local machines.
β31Updated 7 years ago
Alternatives and similar repositories for nypto
Users that are interested in nypto are comparing it to the libraries listed below
Sorting:
- A python based utility to download animes for offline viewing Β―\(γ)/Β―β13Updated 4 years ago
- Shellcode / Buffer Overflow π£β20Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergencyβ12Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.β22Updated 6 years ago
- SWF Vulnerability & Information Scannerβ19Updated 6 years ago
- Python implementation of the SlowLoris DoS attack.β24Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online brutingβ19Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLYβ23Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.β48Updated 4 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Headβ¦β19Updated 5 years ago
- yet another dirbusterβ20Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β18Updated 7 years ago
- A first look at browser-based Cryptojackingβ17Updated 7 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloadsβ26Updated 3 years ago
- Fresh malware samples caught in the wild daily from random places. π£β19Updated 6 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware tβ¦β65Updated 4 months ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.β15Updated 3 years ago
- The Hall of Ancient Exploitation Toolsβ16Updated 5 years ago
- β40Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.β24Updated 7 years ago
- :e-mail: Enumerate usernames through SMTP serviceβ18Updated 6 years ago
- A simple AES malware crypterβ16Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniquesβ25Updated 4 years ago
- Universal LAN-based SSRF Attack Primitiveβ19Updated 6 years ago
- Experimenting with destructive file attacks in Goβ18Updated 6 years ago
- Exploit for win10 SMB3.1β17Updated 5 years ago
- recover Firefox and more browsers loginsβ48Updated 3 years ago
- β24Updated 4 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to reβ¦β12Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C serverβ17Updated 8 years ago