woah1337 / xmrig-silent
Silent Monero (XMR) CPU miner
☆23Updated 6 years ago
Alternatives and similar repositories for xmrig-silent:
Users that are interested in xmrig-silent are comparing it to the libraries listed below
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- ☆35Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Exploits I've authored☆60Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 6 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Loader and RunPE file executer☆17Updated 5 years ago
- .net based packer/obfuscator with apc based pe injection☆15Updated 8 years ago
- Мутация PE x86☆15Updated 5 years ago
- ☆29Updated 3 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 6 months ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 4 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 5 years ago
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆12Updated 4 years ago
- An example of how to use Microsoft Windows Warbird technology☆27Updated last year
- ☆22Updated 4 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 4 years ago
- A Windows API hooking library !☆31Updated 2 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- .lib file for linking against the NT CRT☆18Updated 2 years ago
- Debugger checks in 3 ways☆18Updated 7 years ago