vkremez / POSMalwareC2TrackerProject
Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: Creates a SQL table with over 100 known point-of-sale malware command-and-control servers and visualizes the database via GoogleMap API.]
☆22Updated 7 years ago
Alternatives and similar repositories for POSMalwareC2TrackerProject:
Users that are interested in POSMalwareC2TrackerProject are comparing it to the libraries listed below
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆41Updated 9 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆22Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- ☆9Updated 2 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- Mutation Of Vıruses☆51Updated 9 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 8 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- iOS malware samples☆43Updated 8 years ago
- Ransomeware☆46Updated 7 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 10 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Updated 6 years ago
- Repository of tools used in my blog☆51Updated last year
- Miscellaneous exploit code☆19Updated 8 years ago
- Various Crypter Project☆9Updated 11 years ago
- pour plus de tutos veuillez visiter le site☆11Updated 4 years ago
- Social Engineering Toys☆36Updated 9 years ago
- PoC Android smart phone botnet☆78Updated 12 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- ☆52Updated 4 years ago
- Bash script to show how viruses spread and to demonstrate how ransomware works.☆19Updated 2 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆18Updated 6 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet …☆14Updated 3 years ago
- Malware Dump☆20Updated 8 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago