wrinkl3 / MineSweepR
Detect embedded cryptocurrency miners based on CPU usage
☆20Updated 7 years ago
Alternatives and similar repositories for MineSweepR:
Users that are interested in MineSweepR are comparing it to the libraries listed below
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Collection of metasploit modules☆67Updated 8 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆62Updated 8 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- POLAR☆73Updated 6 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago