Sourcecode of Infostealer.Dexter POS Malware and C&C
☆51Mar 1, 2016Updated 10 years ago
Alternatives and similar repositories for Dexter-POSGrabber
Users that are interested in Dexter-POSGrabber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Mar 30, 2018Updated 8 years ago
- ATM Configurator aka Tyupkin trojan☆11Mar 23, 2015Updated 11 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆59Jun 26, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Keygen for the ATM Malware Cutlet Maker☆90Dec 28, 2020Updated 5 years ago
- Uma pequena coleção de malwares produzidos para atacar em território nacional☆15Feb 26, 2018Updated 8 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 8 years ago
- Penetration Testing Tool for Windows 7 => 10☆14Sep 19, 2018Updated 7 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- The collateral repository for The KQL Mysteries series☆27Mar 8, 2024Updated 2 years ago
- win api hooks☆15Jun 8, 2017Updated 8 years ago
- A small utility to run raw code chunks in the executable memory area.☆16Feb 6, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The Open Tor Botnet (ZIB)☆32Aug 14, 2015Updated 10 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 6 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- Software Protector☆20Aug 16, 2020Updated 5 years ago
- WASMaker, a novel differential testing framework that can generate complicated Wasm test cases by disassembling and assembling real-world…☆17Jul 27, 2024Updated last year
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆67Dec 22, 2025Updated 4 months ago
- Open-source decompilation of Disstrack☆12Oct 18, 2016Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- This repository provides information and tools related to different types of malware. Each type is organized into separate folders, featu…☆19Aug 1, 2023Updated 2 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- PoC code from blog☆17Mar 10, 2020Updated 6 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Library for parsing magnetic stripe track data of credit cards☆15Feb 18, 2026Updated 2 months ago
- Self-bot designed to fake a QR code nitro gift and trick the target into scanning the malicious payload☆18Apr 8, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆18Dec 2, 2024Updated last year
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 10 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet …☆14Sep 28, 2021Updated 4 years ago
- Metasploitable3 CTF Write-up☆40Dec 12, 2017Updated 8 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆13Sep 6, 2019Updated 6 years ago