tarcisio-marinho / cryptomining
A Linux Cyptomining malware
☆36Updated last year
Alternatives and similar repositories for cryptomining:
Users that are interested in cryptomining are comparing it to the libraries listed below
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 7 years ago
- Simple example of how to remove all malwares from disk and registry.☆40Updated 5 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 8 years ago
- Trojans/Viruses/Worms/Rootkits Source Code Repository☆21Updated 9 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 5 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆22Updated 8 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- Ransomeware☆46Updated 7 years ago
- Batch NetWork Worm with Download & Execute Payload☆12Updated 4 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- Virus Package ( For Educational Purposes )☆33Updated 3 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- HTTP BOTNET☆7Updated last year
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- POC Bitcoin stealer☆86Updated 6 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- JS Jscript - download file from url then run it☆59Updated 5 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆29Updated 6 years ago
- Simple class to search and upload files☆27Updated 5 years ago
- Mirai Botnet DB Project☆26Updated 6 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 7 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆13Updated 3 years ago
- ☆13Updated 6 years ago
- Mutation Of Vıruses☆50Updated 9 years ago