tarcisio-marinho / cryptominingLinks
A Linux Cyptomining malware
☆36Updated 2 years ago
Alternatives and similar repositories for cryptomining
Users that are interested in cryptomining are comparing it to the libraries listed below
Sorting:
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Ransomeware☆46Updated 7 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- iSpy Keylogger☆43Updated 8 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 8 years ago
- Simple example of how to remove all malwares from disk and registry.☆42Updated 6 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆32Updated 7 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆26Updated 7 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆33Updated 8 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆31Updated 7 years ago
- Fud Persistent Windows Backdoor developed purely in python☆30Updated 4 years ago
- HTTP botnet☆62Updated 9 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- pour plus de tutos veuillez visiter le site☆11Updated 4 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- Simple class to search and upload files☆28Updated 6 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆14Updated 3 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 5 years ago