tarcisio-marinho / cryptomining
A Linux Cyptomining malware
☆36Updated last year
Alternatives and similar repositories for cryptomining:
Users that are interested in cryptomining are comparing it to the libraries listed below
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Ransomeware☆46Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 7 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 7 years ago
- HTTP BOTNET☆8Updated 2 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 7 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆45Updated 3 years ago
- Simple example of how to remove all malwares from disk and registry.☆40Updated 5 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- Virus RAT v8.0 Beta☆23Updated 8 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆30Updated 6 years ago
- iSpy Keylogger☆42Updated 8 years ago
- JS Jscript - download file from url then run it☆59Updated 5 years ago
- POC Bitcoin stealer☆87Updated 6 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 6 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆26Updated 8 years ago
- Nj RAT Stub☆15Updated 8 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Updated 6 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- Source code of Claw Key logger previously sold on HackForums☆55Updated 2 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- Batch NetWork Worm with Download & Execute Payload☆12Updated 4 years ago
- ClipBanker Spy Trojan☆11Updated 7 months ago