Detection: Identify the presence of the Ploutus malware by checking for known indicators of compromise (IoCs) such as specific files, registry keys, or processes. Response: Take proper measures such as stopping malicious processes, removing malicious files, and notifying administrators.
☆11Sep 5, 2024Updated last year
Alternatives and similar repositories for Ploutus-ATM-malware-Detector
Users that are interested in Ploutus-ATM-malware-Detector are comparing it to the libraries listed below
Sorting:
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- XXX-O-DUS Scraper Development for Kodi - Kodi is a registered trademark of the XBMC Foundation. We are not connected to or in any other w…☆18Aug 27, 2017Updated 8 years ago
- Keygen for the ATM Malware Cutlet Maker☆89Dec 28, 2020Updated 5 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- Samy Kamkar's Magspoof using SMD components☆16Dec 1, 2015Updated 10 years ago
- Replay and embed script recorded terminal sessions in HTML☆10Oct 17, 2019Updated 6 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- fofa+xray vul scan golang☆10Sep 19, 2021Updated 4 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 9 months ago
- 基于机器学习的Webshell检测工具☆12May 15, 2023Updated 2 years ago
- ARL使用代理池联动nuclei,xray通过企业微信机器人告警☆10Oct 28, 2022Updated 3 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- ☆11Feb 10, 2022Updated 4 years ago
- 基于 ajaxfileupload.js 文件的增强版 ajaxfileupload.js☆11Apr 8, 2019Updated 6 years ago
- Webapp builder: The easy (and fast) way to create a web project☆13Jul 3, 2017Updated 8 years ago
- A web crawler written in PHP php网络蜘蛛,信息收集工具A web spider, using php, based on cURL & simple html dom.☆12Feb 18, 2015Updated 11 years ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- Goby-Poc-Collection for Goby scanner https://github.com/gobysec/Goby - forked from many github accounts Thanks the authors☆12Dec 10, 2023Updated 2 years ago
- Fully Functional Ecommerce app Utilizing Node Js API, MongoDB, React Js, Payment Integration with Paypal, and Credit Card.☆10Apr 20, 2023Updated 2 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 3 months ago
- A google dork parser that bypasses captcha's automatically.☆17Jul 15, 2025Updated 7 months ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- my nuclei templates #new☆11Jun 24, 2024Updated last year
- Parser library for 8SVX: digitally sampled audio voices consisting of 8-bit samples☆12Mar 2, 2024Updated 2 years ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 8 months ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Credit card generator that can use for free trial and valid but not allow to store money and it's not owned by anyone.☆13Jan 2, 2024Updated 2 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Counter-Strike 1.6 Dedicated Server☆10Dec 31, 2022Updated 3 years ago