🔵 ethereum grid trading bot
☆36Oct 10, 2025Updated 5 months ago
Alternatives and similar repositories for ethereum-grid-bot
Users that are interested in ethereum-grid-bot are comparing it to the libraries listed below
Sorting:
- ☆12Feb 19, 2017Updated 9 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Opensource Project allow you to DIY an remote-car which can be controled via BLE4.0 on your phone☆19Oct 12, 2015Updated 10 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- ☆24Nov 17, 2017Updated 8 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- A tool to investigate the Windows device manager☆13Feb 12, 2019Updated 7 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆44Oct 3, 2018Updated 7 years ago
- oneHookLibraryIOS☆11Dec 29, 2020Updated 5 years ago
- PowerShell interpreter for unmanaged (non CLI) C++ projects☆16Jul 19, 2017Updated 8 years ago
- ☆12Oct 19, 2017Updated 8 years ago
- 基于WinDivert实现的一个包过滤与截断程序☆13Jul 22, 2018Updated 7 years ago
- A collection of useful aggressor scripts. All credits due to its authors.☆12Jul 5, 2019Updated 6 years ago
- ☆11Mar 11, 2015Updated 10 years ago
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- A minimal tool to extract shellcode from 64-bit PE binaries.☆54Sep 13, 2021Updated 4 years ago
- Properly Engineered Infection Kit, A framework for creating malware in C#. Multi-threaded, comes with a built-in MSIL obfuscator and pack…☆15Jun 30, 2011Updated 14 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- A C++ cross-platform log library.☆13Jun 4, 2022Updated 3 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- library, which help to describe or load and execute PE files.☆55Jun 23, 2013Updated 12 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- 川普语录表情包(程序员版)/ The emoticons about programmer that based the quotations of Donald Trump.☆14Aug 24, 2020Updated 5 years ago
- .net based packer/obfuscator with apc based pe injection☆15Mar 23, 2016Updated 9 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- Comparison table of VMX capabilities for a bunch of processors☆13Nov 3, 2020Updated 5 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆357Updated this week
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- ☆20Oct 14, 2013Updated 12 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago