what you don't know can hurt you
Showing 1 - 19 of 19 RSS Feed

Files

Malware Analyser 3.1
Posted Jun 12, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added DLL analysis and batch mode scan.
tags | tool, forensics
MD5 | c8fab461865b96529a451cad58e99e9d

Related Files

Malwarebytes Anti-Malware / Anti-Exploit Update Remote Code Execution
Posted Feb 4, 2015
Authored by todb, Gabor Seljan, Yonathan Klijnsma | Site metasploit.com

This Metasploit module exploits a vulnerability in the update functionality of Malwarebytes Anti-Malware consumer before 2.0.3 and Malwarebytes Anti-Exploit consumer 1.03.1.1220. Due to the lack of proper update package validation a man-in-the-middle attacker could execute arbitrary code by spoofing the update server data-cdn.mbamupdates.com and uploading an executable. This Metasploit module has been tested successfully with MBAM 2.0.2.1012 and MBAE 1.03.1.1220.

tags | exploit, arbitrary, spoof
advisories | CVE-2014-4936
MD5 | 11ee17491f663b3704191ae7e3b0ccc5
MalwareBytes Anti-Exploit Out-Of-Bounds Read Denial Of Service
Posted Jan 21, 2015
Authored by Parvez Anwar

MalwareBytes Anti-Exploit versions 1.03.1.1220 and 1.04.1.1012 suffer from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | fe3efe7b9291e9d274d6230b3a1c89f6
Reverse Engineering Malware Part 1
Posted May 2, 2012
Authored by Arunpreet Singh

Whitepaper called Reverse Engineering Malware Part 1.

tags | paper
MD5 | 5a024a46d9813b832462a13a9362ba84
Malware Removal Guide For Windows
Posted Apr 10, 2012
Authored by Lawrence Abrams | Site selectrealsecurity.com

Malware Removal Guide for Windows was written to help remove most malicious software on a Windows operation system.

tags | paper
systems | windows
MD5 | 508b60e6d890f810fd062ed4a8a06c7d
Malware Reverse Engineering Part 1 - Static Analysis
Posted Jan 18, 2012
Authored by Rick Flores

This malware report is part 1 of 2. This report is an effort to track, categorize, contain, understand root cause and infection vector of said user account/s, networked equipment or computer/s. This report pertains to all incidents reported by TIER II help desk, TIER III engineers, customer complaints or random IT Security audit/finding/pen test.

tags | paper, root, virus
MD5 | 69bc5bbf5b19339b58ee550bfdd3e451
Antivirus Software Bypass
Posted Nov 7, 2011
Authored by reset557

Various antivirus software on Windows fails to detect, block and/or move malware if the executable file has only execution permission and no read, write, or other bits set.

tags | advisory, bypass
systems | windows
MD5 | a7be981a51b39ee536ef05cdddeb9a55
Malware Analyser 3.3
Posted Oct 3, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added traces signatures. Improved parsing. Bug fixes.
tags | tool, forensics
MD5 | 1312f218a6a5479d9b4329833cfa013c
Malware Analyser 3.2
Posted Jul 16, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added ThreatExpert for online scanning option. Packed libraries onto single executable. Improved traces signatures. Bug fixes.
tags | tool, forensics
MD5 | ba35d7a06043feac7b076c2e2f472468
Malware Analyser 3.0
Posted Apr 21, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added banking trojan traces and dynamic register analysis. Improved traces signatures. Various other updates.
tags | tool, forensics
MD5 | 5e548ca47bc2ac33878133ce40ca50eb
Malware Check Tool 1.2
Posted Sep 6, 2010
Authored by Mert SARICA | Site mertsarica.com

Malware Check Tool is a python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.

Changes: Various bug fixes.
tags | tool, web, scanner, python
systems | unix
MD5 | 73c60c1c35d7daa27937e24f114d62f6
Malware Epidemic On Orkut
Posted Jul 13, 2010
Authored by D4rk357

Brief whitepaper detailing a malware epidemic that has broken out on Orkut.

tags | advisory
MD5 | deb956aaa7c9c2ed0374d1598d67c9e0
Malware Check Tool 1.0
Posted Apr 6, 2010
Authored by Mert SARICA | Site mertsarica.com

Malware Check Tool is a python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.

tags | tool, web, scanner, python
systems | unix
MD5 | 3e2a816a3b73dc9aac493751accea0d5
Malware 2010 Call For Papers
Posted Mar 22, 2010
Site malware10.loria.fr

Malware 2010 Call For Papers - The 5th IEEE International Conference on Malicious and Unwanted Software (Malware 2010) will be held in Nancy, France, October 20th through the 21st, 2010. The conference is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field of malicious and unwanted software. Techniques, economics and legal issues surrounding the topic of Malware, and the methods to detect and control them will be discussed.

tags | paper, conference
MD5 | 51a09700fb297dc62e099659480240f6
Spywaredb3.2squared.com SQL Injection
Posted Apr 8, 2009
Authored by Xia Shing Zee

The affiliate group that controls many rogue anti-malware software has a SQL injection vulnerability in their control panel that hosts all their sites. This control panel, is also hosted on a domain that is controlled by the rogue group. On the control panel, resides a user list, malware search, definition search, settings, statistics, archives, various databases, and TODO lists.

tags | exploit, sql injection
MD5 | dc9a9aacd2bc15ed1d00991bcfca2e57
malware.pdf
Posted Jan 14, 2007
Authored by Nicolas Falliere

Whitepaper entitled "Anatomy of a Malware". A tutorial that was created to educate people on how a simple piece of malware works.

tags | paper, virus
MD5 | 0c505de3a11f6f53a4679b6c0b100a10
malware-trends.pdf
Posted Jan 11, 2006
Site ddanchev.blogspot.com

What are the driving forces behind the rise of malware? Who is behind it, and what tactics do they use? How are vendors responding, and what should organizations, researchers, and end users keep in mind for the upcoming future? These and many other questions will be discussed in this article, combining security experience, business logic, a little bit of psychology, market trends, and personal chats with knowledgeable folks from the industry.

tags | paper
MD5 | 3452a22642ccd435f41d3b4b964fec30
malware10192004.txt
Posted Oct 27, 2004
Authored by http-equiv | Site malware.com

Technical exercise demonstrating the enormously elaborate methods required to defeat the current security mechanisms in place in both Microsoft Windows XP SP2 and Internet Explorer 6.00 SP2 fully patched.

tags | advisory
systems | windows, xp
MD5 | 51b24b1f7ff67c137b10c010626f02a9
malwareSpoof.txt
Posted Jan 27, 2004
Authored by http-equiv | Site malware.com

Trivial way to do file spoofing in Internet Explorer versions 6.0.2800.1106 and below.

tags | exploit, spoof
MD5 | 494805d0fdbf547e8ba0186e823e4ff2
malware.txt
Posted Jul 24, 2003
Site malware.com

Post discussing vulnerabilities in deployment of dangerous files onto a target machine utilizing the Windows Media Player.

tags | advisory, vulnerability
systems | windows
MD5 | 99d414540f167a7918c5087ddfffccb3
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    1 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    1 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close