βοΈπ° Network monitoring solution to detect crypto-mining on local machines.
β31Jun 27, 2018Updated 7 years ago
Alternatives and similar repositories for nypto
Users that are interested in nypto are comparing it to the libraries listed below
Sorting:
- A first look at browser-based Cryptojackingβ16Jun 7, 2018Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniquesβ25Jul 27, 2021Updated 4 years ago
- βοΈ A simple page to mine monero using Coin hiveβ22Sep 7, 2020Updated 5 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilioβ10Mar 1, 2018Updated 8 years ago
- A collection of open source and commercial tools that aid in red team operations.β13Apr 26, 2018Updated 7 years ago
- A repository teaching bss/data segment exploitation techniques.β13Aug 11, 2019Updated 6 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.β17Mar 23, 2020Updated 5 years ago
- Corpus of crypto formatsβ12Dec 2, 2022Updated 3 years ago
- Easy sandboxing for rustβ11Jun 19, 2016Updated 9 years ago
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".β10Jan 11, 2023Updated 3 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and preβ¦β12Jan 28, 2017Updated 9 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.β49Feb 8, 2020Updated 6 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.β10Jan 15, 2015Updated 11 years ago
- ποΈ WebShell Backdoor Frameworkβ16Jun 7, 2018Updated 7 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ17Apr 23, 2020Updated 5 years ago
- An SMS gateway that allows you to check your bitcoin wallet. A weekend hack.β13Mar 16, 2014Updated 11 years ago
- An Ubuntu 18.04 box for Mythic C2 framework developmentβ17Jun 17, 2022Updated 3 years ago
- Identifies Bluetooth Low-energy devicesβ16Jul 26, 2020Updated 5 years ago
- Bypass AntiVirus with Python and Metasploit using shellcodeβ11Mar 25, 2016Updated 9 years ago
- Red Teaming Tactics and Techniquesβ13Feb 10, 2022Updated 4 years ago
- The third open source piece of ransomware using bashβ15Aug 18, 2015Updated 10 years ago
- Hack accounts and passwords on Asterisk serversβ17Mar 16, 2015Updated 10 years ago
- A ptrace based sandbox. (PoC)β14Jun 3, 2018Updated 7 years ago
- GitHub CVE Repository Huntβ18Jul 23, 2024Updated last year
- An tool for search IOT MQTT vulnerable with shodanβ20Sep 15, 2017Updated 8 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisionsβ17Aug 17, 2022Updated 3 years ago
- A small python library for exploiting simple chosen-plaintext attacks.β40May 3, 2014Updated 11 years ago
- Simplified NAT Slipstream server and clientβ22Dec 4, 2020Updated 5 years ago
- DES Encrypter/Decrypterβ20Feb 12, 2017Updated 9 years ago
- Red team oriented key finder and correlatorβ21Nov 21, 2025Updated 3 months ago
- PHP Phishing Frameworkβ28Dec 28, 2013Updated 12 years ago
- Pure Honeypots with an automated bash scriptβ21Sep 9, 2021Updated 4 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Headβ¦β20Mar 29, 2020Updated 5 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devicesβ22May 14, 2017Updated 8 years ago
- Polymorphic ELF Virusβ18Mar 19, 2022Updated 3 years ago
- The Grum Spam Botβ20Feb 25, 2015Updated 11 years ago
- Experiments on C/C++ Exploitsβ22Jun 30, 2020Updated 5 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile versionβ23May 17, 2018Updated 7 years ago
- Open-source Exploiting Frameworkβ31Mar 13, 2017Updated 8 years ago