tarcisio-marinho / cryptominingLinks
A Linux Cyptomining malware
☆36Updated 2 years ago
Alternatives and similar repositories for cryptomining
Users that are interested in cryptomining are comparing it to the libraries listed below
Sorting:
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆49Updated 6 years ago
- Ransomeware☆46Updated 7 years ago
- HTTP BOTNET☆8Updated 2 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- Download payload to disk and install it to startup then melt.☆37Updated 6 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆32Updated 7 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- Simple example of how to remove all malwares from disk and registry.☆42Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆36Updated 5 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- iSpy Keylogger☆43Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Simple way to read wirte delete values from registry☆18Updated 6 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆31Updated 6 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆72Updated 4 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- Virus RAT v8.0 Beta☆24Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Updated 6 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆77Updated 2 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago