tarcisio-marinho / cryptominingLinks
A Linux Cyptomining malware
☆36Updated 2 years ago
Alternatives and similar repositories for cryptomining
Users that are interested in cryptomining are comparing it to the libraries listed below
Sorting:
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 6 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- Ransomeware☆47Updated 7 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 5 years ago
- HTTP BOTNET☆8Updated 2 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆76Updated 2 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆45Updated 3 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Totally anonymous botnet client with an emphasis on individual zombie control, resiliency of the host machine, and ease of remote code ex…☆18Updated 2 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆31Updated 7 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- JS Jscript - download file from url then run it☆59Updated 5 years ago
- The Open Tor Botnet (ZIB)☆30Updated 9 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆32Updated 8 years ago
- Crypter For Malware and Stealer☆34Updated 5 years ago
- An advanced Ransomware with CryptoGraphy and all the stuff.☆7Updated 4 years ago
- BlackWorm SRC Extract☆16Updated 8 years ago
- An open source RansomWare☆87Updated 5 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- MIRAI botnet in python3☆19Updated 5 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆19Updated 8 years ago
- Mirai Botnet DB Project☆26Updated 6 years ago