wrinkl3 / MineSweepRLinks
Detect embedded cryptocurrency miners based on CPU usage
☆20Updated 7 years ago
Alternatives and similar repositories for MineSweepR
Users that are interested in MineSweepR are comparing it to the libraries listed below
Sorting:
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- File/Web Text Scraper and Wordlist Generator☆40Updated 4 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Network based protocol fuzzer☆71Updated 3 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 2 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- ☆15Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 12 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Exploits and research stuffs☆54Updated last year
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Protect your parents from phishing☆39Updated 7 years ago