shayanb / cryptojacking-first-paper
A first look at browser-based Cryptojacking
☆15Updated 6 years ago
Alternatives and similar repositories for cryptojacking-first-paper:
Users that are interested in cryptojacking-first-paper are comparing it to the libraries listed below
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A repository of LIVE malwares for your own joy and pleasure☆13Updated 8 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 2 years ago
- Public exploits☆14Updated 6 years ago
- Open-source Exploiting Framework☆30Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 7 months ago
- Telnet-2 allows to connect via Tor and define a custom timeout☆10Updated 5 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 11 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- Network white noise collector☆18Updated 8 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Phishing can't get any easier with Tilapia☆11Updated 2 years ago
- DNS logging, detection, ...☆15Updated 2 years ago
- SWF Vulnerability & Information Scanner☆20Updated 6 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated 4 months ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆20Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Various exploits☆10Updated 7 years ago
- Various Crypter Project☆9Updated 11 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Black-Box Penetration Testing and Vulnerability Management Platform, Bachelor's Thesis☆11Updated 8 years ago