wrinkl3 / MineSweepRLinks
Detect embedded cryptocurrency miners based on CPU usage
☆20Updated 7 years ago
Alternatives and similar repositories for MineSweepR
Users that are interested in MineSweepR are comparing it to the libraries listed below
Sorting:
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Collection of metasploit modules☆68Updated 8 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- ☆42Updated 11 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- File/Web Text Scraper and Wordlist Generator☆40Updated 4 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆72Updated 9 years ago
- post-exploitation tools☆15Updated 7 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 2 years ago
- ☆74Updated 2 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago