Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices
☆22May 14, 2017Updated 8 years ago
Alternatives and similar repositories for bankbot-mazain
Users that are interested in bankbot-mazain are comparing it to the libraries listed below
Sorting:
- DNS Botnet Server and Client☆34Aug 28, 2025Updated 6 months ago
- Analizador de tráfico para dispositivos Android potencialmente comprometidos como parte de una botnet orientado a detectar ataques DDoS.☆13Jun 20, 2018Updated 7 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆72Mar 13, 2018Updated 7 years ago
- The Open Tor Botnet (ZIB)☆33Aug 14, 2015Updated 10 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆48Jun 10, 2016Updated 9 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Mar 30, 2018Updated 7 years ago
- Android app that feeds data to Columbus☆45Jan 25, 2016Updated 10 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- IRC based botnet developed in C☆43Jul 11, 2017Updated 8 years ago
- Tinba Banking Trojan☆87Feb 25, 2015Updated 11 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Jul 28, 2017Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- Mirai Botnet DB Project☆26Mar 20, 2019Updated 6 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- This tool will allow Forensic Investigators retrieve saved data from Google Chrome such as saved passwords and usernames, searches, histo…☆26Aug 7, 2017Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆25Dec 14, 2016Updated 9 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- ☆30Jul 26, 2017Updated 8 years ago
- Telegram (v4.9.155353) was rendering file:// links + opening them via NSWorkspace.open -> code execution.☆36Dec 8, 2019Updated 6 years ago
- PewCrypt Ransomware Source☆59Mar 22, 2019Updated 6 years ago
- ☆13Aug 28, 2025Updated 6 months ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆16Feb 24, 2026Updated last week
- ☆12Sep 10, 2019Updated 6 years ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- Talos is.☆15Sep 23, 2025Updated 5 months ago
- My personal profile!☆17Oct 25, 2024Updated last year