vkremez / POSMalwareC2TrackerProjectLinks
Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: Creates a SQL table with over 100 known point-of-sale malware command-and-control servers and visualizes the database via GoogleMap API.]
☆22Updated 7 years ago
Alternatives and similar repositories for POSMalwareC2TrackerProject
Users that are interested in POSMalwareC2TrackerProject are comparing it to the libraries listed below
Sorting:
- IRC based botnet developed in C☆44Updated 8 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- HTTP botnet☆62Updated 9 years ago
- A collection of spywares for education scopes☆40Updated 8 years ago
- Ransomeware☆46Updated 8 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆46Updated 9 years ago
- Community driven computer worm☆69Updated 3 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- Malicious Software SRC Extract☆32Updated 2 years ago
- Miscellaneous exploit code☆20Updated 8 years ago
- Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆149Updated 5 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 8 years ago
- Dangerous Malwares☆211Updated 8 years ago
- A simple phishing tool that can phish almost any website☆78Updated 6 years ago
- iSpy Keylogger☆43Updated 8 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- python remote access trojan☆37Updated 8 years ago
- ☆59Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆26Updated 6 years ago
- Bash script to show how viruses spread and to demonstrate how ransomware works.☆20Updated 2 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- pour plus de tutos veuillez visiter le site☆11Updated 5 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆33Updated 8 years ago
- ☆53Updated 4 years ago
- Ro3b - Advance Banking HTTP Botnet☆52Updated 2 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 9 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆41Updated 4 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago