Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service.
Adding New Hash Algorithms
The hash algorithm database is open source and new algorithms can be added on GitHub here. Pull requests are mostly automated and as long as our automated tests...
This tool allows to statically analysis windows, Linux, osx, executables, and also APK files.
You can get:
What DLL files are used.
Functions and API.
Sections and segments.
URLs, IP addresses, and emails.
Android permissions.
File extensions and their names.
And so...
PHP malware finder does it is very best to detect obfuscated/dodgy code as well as files using PHP functions often used in malware/webshells.
The following list of encoders/obfuscators/webshells are also detected:
Best PHP Obfuscator
Carbylamine
Cipher Design
Cyklodev
Joes...
IObit Malware Fighter 8 Free
All-Around PC Protection with Powerful Anti-Malware & Privacy Locking
Real-Time Threats Blocking
Our powerful malware fighter protects you against any PC threats like virus, ransomware, spyware, Trojans, adware and worms etc. Even the newest malware, such as...
A windows malware with complete different nature which allows you to bypass Windows Defender security. It uses http request and gives you Command Prompt/Powershell access. Last FUD check was April,2021 .. I hope It is still undetectable by AVs.
Hidden content
How to use
Change BtcAddy on line 7 to your wallet address.
additionally convert the file to an exe by opening exe.bat
to change the name of the exe just edit exe.bat and replace Test with the name you want
How it works
It checks the persons clipboard if it contains a possible...
Malware Hunter
Hyper scan makes you enjoy a faster scanning speed.
Detect and remove stubborn malware, against potential danger.
Malware Hunter is an award-winning product that provides comprehensive protection against all types of threats, secures your data, protects your privacy and...
Description
ـــــــــــــــــــــــــــ
If you are completely new to reverse engineering and malware analysis, then this course is for you. I will take you from zero to proficient level in reverse engineering and analyzing malware. You will learn using plenty of practical walk-throughs. We will...
Cybersecurity researchers from Bitdefender discovered a new malware, “MosaicLoader,” which is targeting users looking online for pirated software.
Adversaries often target users with various phishing tactics. But sometimes, unwitting users fall into a hacker’s trap, revealing their private data...
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.
It has been developed and released by the Amnesty International Security Lab in July 2021 in...
In this course, we introduce new techniques to help speed up analysis and transition students from malware analyst to reverse engineer. We skip the malware analysis lab set up and put participants hands on with malware analysis.
Course Goals
By the end of this course, students should be able...
Malware Hunter
Hyper scan makes you enjoy a faster scanning speed.
Detect and remove stubborn malware, against potential danger.
Malware Hunter is an award-winning product that provides comprehensive protection against all types of threats, secures your...
A Beginner's Course on Reverse Engineering and Analyzing Malicious .NET and Java Executable Files
What you'll learn
Decompiling .NET and Java Binaries
De-obfuscation of .NET and Java Code
Analyzing .NET and Java Malware
Detecting Malware Artifacts and Indicators of Compromise...
Windows-Malware-Effects-Remediation-Tool
An open-source tool that makes recovering from malware effects - something AVs can't do - MUCH easier.
Known Issues
Automatic Repair doesn't work. This has been disabled.
"Perform repair on separate drive" feature does not work. This has been...
RogueKiller Anti Malware Premium – is an advanced and approachable security application designed to scan sensitive areas on the computer to identify and remove malware agents, including the OS memory.
It focuses on processes, Windows, services, rootkits, the Windows task scheduler, MBR, and web...
A Beginner's Course on Analyzing Malicious PDF and Microsoft Office Documents Using Remnux and Windows Virtual Machines
What you'll learn
Analyzing Malicious Documents
Analyzing Malicious PDF documents
Analyzing Malicious Microsoft documents
Install Remnux Virtual Machine
...
✅ Free Botnet Cleaning And Malware Analysis
The " Cyber Swachhta Kendra " (Botnet Cleaning and Malware Analysis Centre) is a part of the Government of India's Digital India initiative under the Ministry of Electronics and Information Technology (MeitY) to create a secure cyber space by...
Malware Hunter
Hyper scan makes you enjoy a faster scanning speed.
Detect and remove stubborn malware, against potential danger.
Malware Hunter is an award-winning product that provides comprehensive protection against all types of threats, secures your data...
About
a BTC Clipper or a "Bitcoin Clipper" is a type of malware designed to target cryptocurrency transactions.
It operates by replacing the recipient cryptocurrency wallet addresses with ones owned by the cyber criminals. This tool demonstrates how certain cyber criminals redirect...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.