Cryptojacker Payload is an Agent Plugin for Infection Monkey that can simulate the behavior of a cryptojacker. The plugin will use the CPU and memory of infected systems to perform cryptographic operations. It can also imitate bitcoin mining network traffic by sending network requests.
For more information, see the Cryptojacker Payload Plugin documentation.
To create the resulting Cryptojacker archive, follow these steps:
-
Clone the Repository
$ git clone https://github.com/guardicode/cryptojacker-payload.git $ cd cryptojacker-payload
-
Install development dependencies
This project uses Poetry for managing dependencies and virtual environments, and pre-commit for managing pre-commit hooks.
$ pip install pre-commit poetry $ pre-commit install -t pre-commit $ poetry install
The test suite can be run with the following command:
poetry run pytest
To build the plugin, run the Agent Plugin Builder.
poetry run build_agent_plugin .
The build tool will create Cryptojacker-payload.tar
, which can be installed in
the Monkey Island.