exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files

Malware Removal Guide For Windows
Posted Apr 10, 2012
Authored by Lawrence Abrams | Site selectrealsecurity.com

Malware Removal Guide for Windows was written to help remove most malicious software on a Windows operation system.

tags | paper
systems | windows
SHA-256 | fbfc296b298953c291b21aa480377671b8d0e49e38dc1dd43c89bc6c51084ac4

Related Files

Malwarebytes 4.5 Unquoted Service Path
Posted Mar 7, 2022
Authored by Hejap Zairy

Malwarebytes version 4.5 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 5d3b338c6b63fa0e19f25fadaae3a0c56720448c0466a9380022704057d9075e
Malware Hunting 101
Posted Feb 1, 2021
Authored by SunCSR

Whitepaper called Malware Hunting 101. Written in Vietnamese.

tags | paper
SHA-256 | 4c7c6fc0b06cba7e2b4fb8988f1c690f57a0745feb25e07266255d76ec474755
MalwareFox AntiMalware 2.74.0.150 Local Privilege Escalation
Posted Feb 3, 2018
Authored by Souhail Hammou

MalwareFox AntiMalware version 2.74.0.150 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2018-6593
SHA-256 | 0cd89e4424f7e5ca7ded334e2c740e198543904d8777a8c6b61bd1ff38a9c646
Malwarebytes Anti-Malware / Anti-Exploit Update Remote Code Execution
Posted Feb 4, 2015
Authored by todb, Gabor Seljan, Yonathan Klijnsma | Site metasploit.com

This Metasploit module exploits a vulnerability in the update functionality of Malwarebytes Anti-Malware consumer before 2.0.3 and Malwarebytes Anti-Exploit consumer 1.03.1.1220. Due to the lack of proper update package validation a man-in-the-middle attacker could execute arbitrary code by spoofing the update server data-cdn.mbamupdates.com and uploading an executable. This Metasploit module has been tested successfully with MBAM 2.0.2.1012 and MBAE 1.03.1.1220.

tags | exploit, arbitrary, spoof
advisories | CVE-2014-4936
SHA-256 | 7ff0974c6eceef6b507a55c91fa7ecc2267e3fb1d468c441797b7a7071ac3090
MalwareBytes Anti-Exploit Out-Of-Bounds Read Denial Of Service
Posted Jan 21, 2015
Authored by Parvez Anwar

MalwareBytes Anti-Exploit versions 1.03.1.1220 and 1.04.1.1012 suffer from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 3259b673e5b298e7ac53c957351c5819f461a0171a4f1b0766bfbac1cfbdacdf
Apple Security Advisory 2012-05-14-1
Posted May 15, 2012
Authored by Apple | Site apple.com

Apple Security Advisory 2012-05-14-1 - This update runs a malware removal tool that will remove the most common variants of the Flashback malware. If the Flashback malware is found, it presents a dialog notifying the user that malware was removed. There is no indication to the user if malware is not found.

tags | advisory
systems | apple
SHA-256 | ff2f94e0d38ea69f36970a1ad604758214b956d4b4c5ef71810c7ef1ed9fd7ef
Reverse Engineering Malware Part 1
Posted May 2, 2012
Authored by Arunpreet Singh

Whitepaper called Reverse Engineering Malware Part 1.

tags | paper
SHA-256 | 36dd2e02c332eee7ad1b0a13487a9cc66d5bcca061c99f0a07d0ec1b39863a5f
Apple Security Advisory 2012-04-13-1
Posted Apr 14, 2012
Authored by Apple | Site apple.com

Apple Security Advisory 2012-04-13-1 - This update runs a malware removal tool that will remove the most common variants of the Flashback malware. If the Flashback malware is found, it presents a dialog notifying the user that malware was removed. There is no indication to the user if malware is not found. This update is available for OS X Lion systems that do not have Java installed.

tags | advisory, java
systems | apple, osx
SHA-256 | bd22d552b5690a6807fe6409d749b643aff68c006e6425cebeeaef89b0278536
Malware Reverse Engineering Part 1 - Static Analysis
Posted Jan 18, 2012
Authored by Rick Flores

This malware report is part 1 of 2. This report is an effort to track, categorize, contain, understand root cause and infection vector of said user account/s, networked equipment or computer/s. This report pertains to all incidents reported by TIER II help desk, TIER III engineers, customer complaints or random IT Security audit/finding/pen test.

tags | paper, root, virus
SHA-256 | 8ace29513474b3ae5ebf23335d1c8782b885f19d4f5db31bcf348fcb6e7db1b8
Antivirus Software Bypass
Posted Nov 7, 2011
Authored by reset557

Various antivirus software on Windows fails to detect, block and/or move malware if the executable file has only execution permission and no read, write, or other bits set.

tags | advisory, bypass
systems | windows
SHA-256 | 879cd8a29ab09f08b7c40d225925d5e8508b102a9ffe9d1dc4638c067da81f49
Malware Analyser 3.3
Posted Oct 3, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added traces signatures. Improved parsing. Bug fixes.
tags | tool, forensics
SHA-256 | f349bdbbeafc34f1e51d0e1bafb7ebaade4f4140aa0d2c8365eae7c7b00ab480
Malware Analyser 3.2
Posted Jul 16, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added ThreatExpert for online scanning option. Packed libraries onto single executable. Improved traces signatures. Bug fixes.
tags | tool, forensics
SHA-256 | 8f97c0865fbaa3413d8b485397cc6e12ec502b7798cce86f6a4b246286cdf22f
Malware Analyser 3.1
Posted Jun 12, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added DLL analysis and batch mode scan.
tags | tool, forensics
SHA-256 | 3af0d1f22f3669d267dde29c93584f1f6061588dcdc62dde41660a76aec55d2b
Malware Analyser 3.0
Posted Apr 21, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added banking trojan traces and dynamic register analysis. Improved traces signatures. Various other updates.
tags | tool, forensics
SHA-256 | f0441c544a8826462e893ab8a63bb69a28c9d6e665cbbe115dcd76279374aa05
Malware Check Tool 1.2
Posted Sep 6, 2010
Authored by Mert SARICA | Site mertsarica.com

Malware Check Tool is a python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.

Changes: Various bug fixes.
tags | tool, web, scanner, python
systems | unix
SHA-256 | 1da2d31cf70bc80c92291577f2083b14031a5734ec0581920bfa1e0f0bde24ab
Malware Epidemic On Orkut
Posted Jul 13, 2010
Authored by D4rk357

Brief whitepaper detailing a malware epidemic that has broken out on Orkut.

tags | advisory
SHA-256 | 73dc54ba8b4aeec48a54c65b229212900579d41ddf955358bc47f8b81eafc3f8
Malware Check Tool 1.0
Posted Apr 6, 2010
Authored by Mert SARICA | Site mertsarica.com

Malware Check Tool is a python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.

tags | tool, web, scanner, python
systems | unix
SHA-256 | 79dd3d0c7dc9f48914728d425f112804cc3da0e65148b0374bb4360af84b37fc
Malware 2010 Call For Papers
Posted Mar 22, 2010
Site malware10.loria.fr

Malware 2010 Call For Papers - The 5th IEEE International Conference on Malicious and Unwanted Software (Malware 2010) will be held in Nancy, France, October 20th through the 21st, 2010. The conference is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field of malicious and unwanted software. Techniques, economics and legal issues surrounding the topic of Malware, and the methods to detect and control them will be discussed.

tags | paper, conference
SHA-256 | 383461f7576b55115bbe7be0f58312ce5728f64ebd6557ae2ef0a535cce01f87
Spywaredb3.2squared.com SQL Injection
Posted Apr 8, 2009
Authored by Xia Shing Zee

The affiliate group that controls many rogue anti-malware software has a SQL injection vulnerability in their control panel that hosts all their sites. This control panel, is also hosted on a domain that is controlled by the rogue group. On the control panel, resides a user list, malware search, definition search, settings, statistics, archives, various databases, and TODO lists.

tags | exploit, sql injection
SHA-256 | 91efcacabf3584593f19b0e4930f367709869382192c56579661b8026a992287
malware.pdf
Posted Jan 14, 2007
Authored by Nicolas Falliere

Whitepaper entitled "Anatomy of a Malware". A tutorial that was created to educate people on how a simple piece of malware works.

tags | paper, virus
SHA-256 | 5172b6396a1d3bf6c98f00741dec0697cfc325806e2509483c51c1658ee514dc
malware-trends.pdf
Posted Jan 11, 2006
Site ddanchev.blogspot.com

What are the driving forces behind the rise of malware? Who is behind it, and what tactics do they use? How are vendors responding, and what should organizations, researchers, and end users keep in mind for the upcoming future? These and many other questions will be discussed in this article, combining security experience, business logic, a little bit of psychology, market trends, and personal chats with knowledgeable folks from the industry.

tags | paper
SHA-256 | 0090cfb31408a8fe6a1a37416a4c00716e65ef1fbf0400d4b057e7561da9b074
malware10192004.txt
Posted Oct 27, 2004
Authored by http-equiv | Site malware.com

Technical exercise demonstrating the enormously elaborate methods required to defeat the current security mechanisms in place in both Microsoft Windows XP SP2 and Internet Explorer 6.00 SP2 fully patched.

tags | advisory
systems | windows
SHA-256 | 6fb0a58cc4a94db5f5ff84d35499da125dd5fa0ff5907d7c79123a8216912a11
malwareSpoof.txt
Posted Jan 27, 2004
Authored by http-equiv | Site malware.com

Trivial way to do file spoofing in Internet Explorer versions 6.0.2800.1106 and below.

tags | exploit, spoof
SHA-256 | 77b83565d337b035d648444f5bce0a768b8022a42f296c2f964bd12f78475766
malware.txt
Posted Jul 24, 2003
Site malware.com

Post discussing vulnerabilities in deployment of dangerous files onto a target machine utilizing the Windows Media Player.

tags | advisory, vulnerability
systems | windows
SHA-256 | 8f316501a1dad19f5066131347357a6b5fef2a66474c18543f7935f8ac377235
Page 1 of 1
Back1Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    32 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close