tarcisio-marinho / cryptominingLinks
A Linux Cyptomining malware
☆37Updated 2 years ago
Alternatives and similar repositories for cryptomining
Users that are interested in cryptomining are comparing it to the libraries listed below
Sorting:
- Windows/Linux - ReverseShellBackdoor Framework☆49Updated 6 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Ransomeware☆46Updated 7 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 8 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 8 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆31Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- Virus RAT v8.0 Beta☆26Updated 8 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆25Updated 7 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆32Updated 7 years ago
- iSpy Keylogger☆43Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 12 years ago
- Zero-Day Code Injection and Persistence Technique☆29Updated 8 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- Windows Remote Administration Tool via Telegram☆34Updated 8 years ago
- Stealth Kid RAT (SKR) is an open-source multi-platform Remote Access Trojan (RAT) written in C#. Released under MIT license. The SKR proj…☆24Updated 4 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 9 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆46Updated 3 years ago
- Simple example of how to remove all malwares from disk and registry.☆42Updated 6 years ago