Skip to content

guardicode/cryptojacker-payload

Repository files navigation

Cryptojacker Payload - Agent Plugin for Infection Monkey

Introduction

Cryptojacker Payload is an Agent Plugin for Infection Monkey that can simulate the behavior of a cryptojacker. The plugin will use the CPU and memory of infected systems to perform cryptographic operations. It can also imitate bitcoin mining network traffic by sending network requests.

For more information, see the Cryptojacker Payload Plugin documentation.

Development

Setting up the development environment

To create the resulting Cryptojacker archive, follow these steps:

  1. Clone the Repository

    $ git clone https://github.com/guardicode/cryptojacker-payload.git
    $ cd cryptojacker-payload
  2. Install development dependencies

    This project uses Poetry for managing dependencies and virtual environments, and pre-commit for managing pre-commit hooks.

    $ pip install pre-commit poetry
    $ pre-commit install -t pre-commit
    $ poetry install

Running the test suite

The test suite can be run with the following command:

poetry run pytest

Building the plugin

To build the plugin, run the Agent Plugin Builder.

poetry run build_agent_plugin .

The build tool will create Cryptojacker-payload.tar, which can be installed in the Monkey Island.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •  

Languages