βοΈπ° Network monitoring solution to detect crypto-mining on local machines.
β31Jun 27, 2018Updated 7 years ago
Alternatives and similar repositories for nypto
Users that are interested in nypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A first look at browser-based Cryptojackingβ16Jun 7, 2018Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniquesβ25Jul 27, 2021Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ17Apr 23, 2020Updated 6 years ago
- βοΈ A simple page to mine monero using Coin hiveβ22Sep 7, 2020Updated 5 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and preβ¦β12Jan 28, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.β49Feb 8, 2020Updated 6 years ago
- A collection of open source and commercial tools that aid in red team operations.β13Apr 26, 2018Updated 8 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.β10Jan 15, 2015Updated 11 years ago
- ποΈ WebShell Backdoor Frameworkβ16Jun 7, 2018Updated 7 years ago
- reinforcement learning for optimal debt collection strategyβ11Dec 8, 2019Updated 6 years ago
- Corpus of crypto formatsβ12Dec 2, 2022Updated 3 years ago
- RGB-based human pose estimation from a webcam in Unity using Vuforia and Barracuda with Pose-ResNet-50 and MiDaSβ10Mar 27, 2022Updated 4 years ago
- The third open source piece of ransomware using bashβ15Aug 18, 2015Updated 10 years ago
- An tool for search IOT MQTT vulnerable with shodanβ21Sep 15, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A ptrace based sandbox. (PoC)β14Jun 3, 2018Updated 7 years ago
- Simplified NAT Slipstream server and clientβ22Dec 4, 2020Updated 5 years ago
- Red team oriented key finder and correlatorβ21Nov 21, 2025Updated 5 months ago
- A minimal SDK that lets an integrator add a Monero Miner using the Javascript miner created by CoinHive. The Monero Miner can be used witβ¦β26Jul 27, 2018Updated 7 years ago
- A small python library for exploiting simple chosen-plaintext attacks.β40May 3, 2014Updated 12 years ago
- Using k-d trees with Apache Spark and Scalaβ11Jul 3, 2015Updated 10 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile versionβ24May 17, 2018Updated 7 years ago
- Open-source Exploiting Frameworkβ32Mar 13, 2017Updated 9 years ago
- An MITM based Social Engineering (Phishing)attack POC!β10Mar 25, 2014Updated 12 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An SMS gateway that allows you to check your bitcoin wallet. A weekend hack.β13Mar 16, 2014Updated 12 years ago
- Human name parser based on JavaScrip-Name-Parser by Josh Fraser.β12May 4, 2015Updated 11 years ago
- β20Jul 30, 2023Updated 2 years ago
- Red Teaming Tactics and Techniquesβ13Feb 10, 2022Updated 4 years ago
- Experiments on C/C++ Exploitsβ22Jun 30, 2020Updated 5 years ago
- django-github-s3 is a project to provide beginners a storage backend on github for free.β15Oct 29, 2022Updated 3 years ago
- An Ubuntu 18.04 box for Mythic C2 framework developmentβ17Jun 17, 2022Updated 3 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Headβ¦β20Mar 29, 2020Updated 6 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Torβ18Mar 12, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.β14Oct 11, 2021Updated 4 years ago
- Android serial port for Kivyβ15Mar 30, 2017Updated 9 years ago
- Detect Phishing fetching Certificate Transparency Logsβ21Jan 13, 2021Updated 5 years ago
- PHP Phishing Frameworkβ28Dec 28, 2013Updated 12 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.β22May 30, 2015Updated 10 years ago
- PoC for a kernel rootkitβ10Feb 20, 2020Updated 6 years ago
- DES Encrypter/Decrypterβ21Feb 12, 2017Updated 9 years ago