shadowctrl / crypto-minerLinks
A automated monero mining (injector) scripts which mines monero for you in targeted system
☆66Updated last year
Alternatives and similar repositories for crypto-miner
Users that are interested in crypto-miner are comparing it to the libraries listed below
Sorting:
- A Powerful Token Stealer! Discord Token Grabber , Password Stealer, Cookie Stealer, File Stealer, Crypto wallet Stealer☆17Updated 2 years ago
- About Wallet Miner that steals Bitcoins by checking Private Keys for Balance Remastered by me☆34Updated last year
- More Advanced and Powerful Scripts made for pen-testing. Here there are Vulnerability Scanners, ARP-Poisoners, Botnets, Phishing Scripts,…☆60Updated 2 years ago
- Wi-Fi-Jammer Using Python Script As BlackHat☆86Updated 4 years ago
- PHP email spoofer | Send emails from any email adress☆81Updated 5 years ago
- Advance mitm attack using fake access point☆134Updated 2 years ago
- Disclaimer :- I am not promoting any illegal activity here . this is purely for educational purpose . i am not responsible if you use it …☆48Updated 2 years ago
- Advanced Keylogger in Python with screenshot, microphone, webcam pictures taking capabilities and also Collects Network/Wifi Info, System…☆131Updated 3 years ago
- Bruteforce tool / cracker for MD5 hashes. Processing single hashes, lists and combolists (userid:md5hash).☆36Updated 4 years ago
- Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42),…☆22Updated 3 years ago
- Wallet Miner that steals Bitcoins by checking Private Keys for Balance☆124Updated 2 years ago
- Bitcoin ATM malware will help you to hack any Bitcoin ATM.☆44Updated 6 years ago
- Trojan Rat Builder(310), Ransomware Builder(7), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Key…☆138Updated 2 years ago
- Fully Uncensored Hacking & Unethical AI☆97Updated 7 months ago
- A malicious access point that injects mining scripts on the fly.☆15Updated 4 years ago
- DDoS Tool using Multi-tor and Torshammer tool☆57Updated 4 years ago
- 888 RAT Pro Options : File Manager Remote Desktop Web cam capture Sound capture Get password (all last browser 2 met…☆82Updated last year
- Malware Repository 2018☆40Updated last year
- 🔥🚀 Destroyer-DoS is a very powerful 🌩️ tool designed to simulate a DoS attack by flooding a specified IP 🎯 and port with TCP packets.…☆36Updated 6 months ago
- Advanced phishing tool used for session & credential grabbing and bypassing 2FA using man-in-the-middle attack with standalone reverse p…☆89Updated 2 years ago
- Info and password stealer☆97Updated 8 years ago
- Stealthy Fully Undetectable (FUD) RAT with 15 plugins: stealer, crypto stealer, keylogger, remote desktop and more more...☆25Updated last year
- program my own pegasus spyware using python☆34Updated 3 years ago
- FLASH BTC TRANSACTION (Core Network) Full Version 7.0.0 is an open-source software sends fake btc to any node (exchanger, peer-to-peer wa…☆37Updated 3 years ago
- USB Ransomware, will encrypt SOME files and steal some, you can change what it steals... once its done, just unplug it from the PC u plug…☆32Updated last year
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆49Updated 6 years ago
- A Python Script For Ip and Location Spoofing‼️☆10Updated last year
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆54Updated last year
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆109Updated 3 years ago
- A Linux shell tool that has multiple tools such as, Instagram Scraper, Phisher, Network Scanner, Port Scanner, Packet Sniffer, Web Scrape…☆22Updated 2 years ago