Sourcecode of Infostealer.Dexter POS Malware and C&C
☆51Mar 1, 2016Updated 10 years ago
Alternatives and similar repositories for Dexter-POSGrabber
Users that are interested in Dexter-POSGrabber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Mar 30, 2018Updated 8 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 11 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆16Jun 3, 2019Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆59Jun 26, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Keygen for the ATM Malware Cutlet Maker☆90Dec 28, 2020Updated 5 years ago
- Uma pequena coleção de malwares produzidos para atacar em território nacional☆15Feb 26, 2018Updated 8 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 8 years ago
- Penetration Testing Tool for Windows 7 => 10☆14Sep 19, 2018Updated 7 years ago
-  # Ukraine-Cyber-Operations Cura…☆27Mar 4, 2022Updated 4 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- The collateral repository for The KQL Mysteries series☆26Mar 8, 2024Updated 2 years ago
- NFC/RFID Card Catcher or skimmer, call it whatever you want.☆72Jul 17, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- The Open Tor Botnet (ZIB)☆34Aug 14, 2015Updated 10 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- Alina Spark - Point of Sales Trojan☆50Feb 25, 2015Updated 11 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Software Protector☆20Aug 16, 2020Updated 5 years ago
- ☆65Dec 22, 2025Updated 3 months ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Open-source decompilation of Disstrack☆12Oct 18, 2016Updated 9 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 9 years ago
- This repository provides information and tools related to different types of malware. Each type is organized into separate folders, featu…☆19Aug 1, 2023Updated 2 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Library for parsing magnetic stripe track data of credit cards☆15Feb 18, 2026Updated 2 months ago
- Microsoft Sentinel related content☆38Jan 22, 2025Updated last year
- ☆17Feb 29, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 10 years ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Metasploitable3 CTF Write-up☆40Dec 12, 2017Updated 8 years ago
- A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet …☆15Sep 28, 2021Updated 4 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆13Sep 6, 2019Updated 6 years ago