vkremez / POSMalwareC2TrackerProjectLinks
Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: Creates a SQL table with over 100 known point-of-sale malware command-and-control servers and visualizes the database via GoogleMap API.]
☆21Updated 7 years ago
Alternatives and similar repositories for POSMalwareC2TrackerProject
Users that are interested in POSMalwareC2TrackerProject are comparing it to the libraries listed below
Sorting:
- Malicious Software SRC Extract☆32Updated 3 years ago
- Miscellaneous exploit code☆21Updated 9 years ago
- Community driven computer worm☆69Updated 3 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆47Updated 9 years ago
- HTTP botnet☆62Updated 9 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆32Updated 5 years ago
- Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆153Updated 6 years ago
- Ransomeware☆47Updated 8 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Updated 9 years ago
- IRC based botnet developed in C☆43Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 9 years ago
- A collection of spywares for education scopes☆43Updated 8 years ago
- Bash script to show how viruses spread and to demonstrate how ransomware works.☆19Updated 2 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- Anubis 7.0☆27Updated last year
- Ro3b - Advance Banking HTTP Botnet☆51Updated 2 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆32Updated 7 years ago
- ☆53Updated 4 years ago
- iSpy Keylogger☆47Updated 9 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- ☆11Updated 3 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- Dangerous Malwares☆213Updated 9 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆66Updated 4 years ago
- python remote access trojan☆38Updated 8 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 5 years ago
- A simple phishing tool that can phish almost any website☆76Updated 7 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21Updated 8 years ago
- remote administrator framework☆22Updated last year