vkremez / POSMalwareC2TrackerProjectLinks
Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: Creates a SQL table with over 100 known point-of-sale malware command-and-control servers and visualizes the database via GoogleMap API.]
☆22Updated 7 years ago
Alternatives and similar repositories for POSMalwareC2TrackerProject
Users that are interested in POSMalwareC2TrackerProject are comparing it to the libraries listed below
Sorting:
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆45Updated 9 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆22Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago
- A repository of LIVE malwares for your own joy and pleasure☆15Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- ☆20Updated 11 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Miscellaneous exploit code☆19Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- HTTP botnet☆61Updated 8 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Updated 5 years ago
- Mutation Of Vıruses☆50Updated 9 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆31Updated 7 years ago
- pen testing scripts☆12Updated 4 years ago
- A python tool that will extract exif data from picture with two methods☆38Updated 3 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago