tarcisio-marinho / cryptomining
A Linux Cyptomining malware
☆36Updated last year
Alternatives and similar repositories for cryptomining:
Users that are interested in cryptomining are comparing it to the libraries listed below
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆57Updated 7 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆43Updated 2 years ago
- Botnet created in p2p architecture.☆10Updated 6 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆58Updated 7 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- POC Bitcoin stealer☆83Updated 6 years ago
- Batch NetWork Worm with Download & Execute Payload☆12Updated 4 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 3 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 5 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆26Updated 6 years ago
- HTTP BOTNET☆8Updated last year
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 6 years ago
- JS Jscript - download file from url then run it☆58Updated 4 years ago
- Simple example of how to remove all malwares from disk and registry.☆40Updated 5 years ago
- Simple class to search and upload files☆26Updated 5 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 7 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆30Updated 6 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆32Updated 4 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 8 years ago
- Simple keylogger on C++ with several functions.☆16Updated 4 years ago
- this makes your payloads, trojans, viruses fully undetectable☆7Updated 7 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Updated 5 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆13Updated 3 years ago
- iSpy Keylogger☆42Updated 8 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago