shadowctrl / crypto-miner
A automated monero mining (injector) scripts which mines monero for you in targeted system
☆60Updated 8 months ago
Alternatives and similar repositories for crypto-miner:
Users that are interested in crypto-miner are comparing it to the libraries listed below
- Disclaimer :- I am not promoting any illegal activity here . this is purely for educational purpose . i am not responsible if you use it …☆48Updated 2 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆47Updated 5 years ago
- A malicious access point that injects mining scripts on the fly.☆15Updated 4 years ago
- Trojan Rat Builder(310), Ransomware Builder(7), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Key…☆123Updated last year
- Malware Repository 2018☆40Updated last year
- Ransomware builder☆87Updated 4 years ago
- Ro3b - Advance Banking HTTP Botnet☆49Updated last year
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆21Updated 3 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆27Updated 3 years ago
- A Powerful Token Stealer! Discord Token Grabber , Password Stealer, Cookie Stealer, File Stealer, Crypto wallet Stealer☆17Updated last year
- WH RAT V2 2022☆22Updated last year
- The DoS tool created by Th3j35t3r, considered one of the most powerful tools since it's creation, leaked by Lulzsec.☆54Updated 6 years ago
- tools, mallware; phishing, botnet, database , courses ..☆71Updated 3 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆51Updated last year
- Phishing Framework for Facebook, Gmail, Twitter, WiFi, Windows.☆70Updated 5 years ago
- Stealthy Fully Undetectable (FUD) RAT with 15 plugins: stealer, crypto stealer, keylogger, remote desktop and more more...☆22Updated last year
- More Advanced and Powerful Scripts made for pen-testing. Here there are Vulnerability Scanners, ARP-Poisoners, Botnets, Phishing Scripts,…☆59Updated 2 years ago
- PHP email spoofer | Send emails from any email adress☆78Updated 4 years ago
- Info and password stealer☆92Updated 8 years ago
- program my own pegasus spyware using python☆27Updated 3 years ago
- A simple and handy tool for a hacker to gain remote access and control another computer☆33Updated 4 years ago
- Steal bitcoin | Replace any address with yours. C#☆16Updated 5 years ago
- Backdoor Generator | Linux & Windows | FUD AV .py .exe☆108Updated 5 years ago
- Make a 100% FUD Android Trojan and Bypass All Anti-Viruses + Android Google Play Protector☆94Updated last year
- ATANK is a android ransomware builder☆69Updated 3 years ago
- This bash script will install wifite2 and its other tools Pyrit, bully, wireshark, hcxtools, hcxdumptool, macchanger☆73Updated 2 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆104Updated 3 years ago
- Hacking the target computer and receiving complete information such as passwords stored in the browser, session theft, cookie theft, cred…☆15Updated 2 years ago
- Trojan Rat Builder(310), Ransomware Builder(7), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Key…☆10Updated 3 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆52Updated last year