wrinkl3 / MineSweepR
Detect embedded cryptocurrency miners based on CPU usage
☆20Updated 7 years ago
Alternatives and similar repositories for MineSweepR:
Users that are interested in MineSweepR are comparing it to the libraries listed below
- Collection of metasploit modules☆67Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- File/Web Text Scraper and Wordlist Generator☆40Updated 4 years ago
- all scripts created/mentioned in blog mh4x0f☆7Updated 6 years ago
- ☆53Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- Scripts that aren't PowerShell☆47Updated 5 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- The Zonefile Transfer Toolkit☆28Updated 3 weeks ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆86Updated 6 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 8 years ago
- Removed according to regulations☆35Updated 7 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago