MemPOS scans for dumps (T1/T2) and CVVs stored in memory, files, keyboard, clipboard or network packets in several different known formats by utilizing algorithms and a series of handpicked Regex.
All traffic is encrypted with SSL and transported via the Tor network to your own hidden service...