A repository for tracking events related to cybersecurity incidents in Nigeria, as reported publicly, documented by affected organizations and shared internally within the cyber community
-
Updated
Aug 13, 2023
A repository for tracking events related to cybersecurity incidents in Nigeria, as reported publicly, documented by affected organizations and shared internally within the cyber community
Decompile, optimize, recompile, and integrate spyware and remote control features into APK and EXE files with LurkerX, the ultimate tool for security researchers, penetration testers, and ethical hackers.
A Malware which records Key-presses, Clipboard & System Information, Chrome History, Microphone Audio, Gathers File Information, Takes Screenshots & Records Video. It supports data encryption, file transfer, runtime logging and data cleanup. We have a lightweight fused obfuscation framework to evade static and dynamic analysis of anti-malware tools
This script employs a cron-scheduled Bash shell routine to monitor for potential system intrusions during low-activity periods. Upon detecting suspicious activity, it leverages the Way2SMS SMS API to send real-time alert notifications to designated personnel.
Add a description, image, and links to the data-theft topic page so that developers can more easily learn about it.
To associate your repository with the data-theft topic, visit your repo's landing page and select "manage topics."