Malware, viruses, what are they?
General explanation about different kinds of online threats. What they do, and how. Introduction Viruses, malware, worms, adware, there are many different kinds of online threats. It can be confusing...
View ArticleRunPE: How to hide code behind a legit process
Study of a hack used by malware to hide code inside a well know process. Introduction Disclaimer: This is not a tutorial to make a malware, but a practical case for educational purpose only. Anyway,...
View ArticleCatch malware with your own Honeypot
Whether your are a security researcher or a sysadmin, you need a honeypot for various reasons: If you are a security researcher it’s because honeypots are very valuable source of malware and exploits,...
View ArticleInfected PDF: Extract the payload
Infected PDFs have always been a privileged way to infect users because this document format is very common and used by almost everyone. Moreover, it exists many ways to exploit Acrobat Reader...
View ArticleRogueKillerPE download
Description RogueKillerPE is a PE parsing tool, able to show internal structure of executable files. It’s able to read either the memory image (process module) or the disk image (filesystem) of a...
View ArticleCuckoo Sandbox Customization
Cuckoo Sandbox is a neat open source project used by many people around the world to test malware into a secure environment, to understand how they work and what they do. Cuckoo is written in a modular...
View ArticleYaraEditor
Description YaraEditor is a tool that will help you to write and test signatures for the Yara engine. To learn how to write signatures with the Yara syntax, please refer to the proper documentation....
View ArticleMalware, Virus, what are they?
General explanation about different kinds of online threats. What they do, and how. Introduction Viruses, malware, worms, adware, there are many different kinds of online threats. It can be confusing...
View ArticleMRF
Based on Jquery-upload-file plugin, modified to handle a MySQL database. MRF (Malware Repository Framework) is able to uniquely identify a sample (with HASH) and keep essential information (size,...
View ArticleCatch malware with your own Honeypot
Whether your are a security researcher or a sysadmin, you need a honeypot for various reasons: If you are a security researcher it’s because honeypots are very valuable source of malware and exploits,...
View ArticleInfected PDF: Extract the payload
Infected PDFs have always been a privileged way to infect users because this document format is very common and used by almost everyone. Moreover, it exists many ways to exploit Acrobat Reader...
View ArticleMalwarebytes
Malwarebytes Anti-Malware targets adware, viruses, rootkits, etc… The program comes in an installer, you can easily uninstall it. It’s compatible with Windows XP, Vista, 7, 8, 8.1, 10. Both 32/64 bits....
View ArticleAdlice PEViewer
Why buy Premium? Privileged support: Easy and Fast support for you, don’t hesitate to bother us. No nag window: Go faster without the nag window. To help us maintaining the software efficient for...
View ArticleRogueKiller Anti-malware
Based on powerful generic detections (heuristics), and on more classic anti-malware analysis (signature finding), RogueKiller is one of the best malware removal software. It is able to find threats...
View Article