therealelyayo / cerberusv4View external linksLinks
A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet in underground forms
☆15Sep 28, 2021Updated 4 years ago
Alternatives and similar repositories for cerberusv4
Users that are interested in cerberusv4 are comparing it to the libraries listed below
Sorting:
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Mar 30, 2018Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22May 14, 2017Updated 8 years ago
- A project on the security in rolling code remote keyless entry systems, primarily used in vehicles. The project uses a laptop with a SDR …☆29May 23, 2022Updated 3 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24May 29, 2018Updated 7 years ago
- Ro3b - Advance Banking HTTP Botnet☆50Jun 12, 2023Updated 2 years ago
- Backdoor for Rubella on Shell's☆32May 4, 2024Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last week
- Coil On Plug Project made with Arduino Nano V3 for Honda/Acura☆13Feb 6, 2023Updated 3 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆72Mar 13, 2018Updated 7 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- ☆29Jul 26, 2017Updated 8 years ago
- Utilizing various Open Source Intelligence (OSINT) tools and techniques that we have found to be effective, DataSploit brings them all in…☆31Mar 25, 2017Updated 8 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 5 months ago
- NIST transition-edge sensor (TES) data acquisition framework☆14Feb 2, 2026Updated last week
- Implemented a data structure that will help solve a simplified version of the mobile phone tracking problem, i.e., the fundamental proble…☆11Oct 18, 2018Updated 7 years ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 3 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- ☆13Aug 28, 2025Updated 5 months ago
- An full-stack eCommerce store web application in nodejs☆11Jun 6, 2024Updated last year
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- ☆12Jun 1, 2024Updated last year
- Calendari elettronici per la raccolta rifiuti di Chieri e comuni limitrofi☆12Dec 23, 2025Updated last month
- browsing through the looking glass☆10Jul 10, 2023Updated 2 years ago
- Script that enables ARMA 3 mission maker to easily implement a shop system in their custom mission.☆11Jul 25, 2024Updated last year
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- 3D progress bar for arma 3☆11Dec 13, 2024Updated last year
- metwork/mfserv module☆12Feb 7, 2026Updated last week
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- PowerShell Module for Extrahop☆15Dec 13, 2018Updated 7 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Terminal with voice AI and banner☆13Jul 29, 2025Updated 6 months ago
- Innora-Defender: 先进的勒索软件分析与恢复框架☆16May 6, 2025Updated 9 months ago
- Interactive summary of Gartner's Magic Quadrant for Web Content Management with d3.js☆17Oct 15, 2012Updated 13 years ago