Jump to content
LeVeL23HackTools

Search the Community

Showing results for tags 'malware'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 15 results

  1. Bloqueo de amenazas en tiempo real Nuestro IObit Malware Fighter 7 te protege contra cualquier amenaza del PC, desde vírus, ransomware, spyware, troyanos, adware y gusanos, etc. Incluso el malware más innovador se mantendrá alejado de ti. Además, el nuevo motor anti-malware te ayuda a obtener un análisis rápido y completo del sistema de tu PC. IObit Malware Fighter 7 también cuenta con el motor antivirus líder mundial de Bitdefender que posee una base de datos de más de 200 millones de amenazas. Protección de privacidad Tus archivos privados pueden ser guardados de forma segura con la caja fuerte de IObit Malware Fighter 7. Sólo tienes que configurar una contraseña e insertar tus datos más sensibles en la caja fuerte para que nadie tenga acceso a estos archivos o carpetas excepto tu. Además, el motor anti-ransomware ofrece una protección extra a tu privacidad impidiendo que los hackers encripten tus archivos. Protección eficaz del navegador IObit Malware Fighter 7 garantiza una navegación segura para tu trabajo o entretenimiento. La protección completa del navegador te ayuda a mantenerte lejos de los sitios web de phishing, evita que tu página de inicio sea modificada para uso malicioso, te mantiene lejos de anuncios molestos y limpia las cookies de seguimiento automáticamente. Protección eficaz del navegador IObit Malware Fighter 7 garantiza una navegación segura para tu trabajo o entretenimiento. La protección completa del navegador te ayuda a mantenerte lejos de los sitios web de phishing, evita que tu página de inicio sea modificada para uso malicioso, te mantiene lejos de anuncios molestos y limpia las cookies de seguimiento automáticamente. Nuevos cambios importantes en IObit Malware Fighter 7 Múltiples funciones útiles que demuestran que IObit Malware Fighter es una herramienta potente que protege y garantiza una seguridad total de tu PC. [Hidden Content] [Hidden Content]
  2. using Megadumper to decrypt .net malware in a VM [Hidden Content] Source code:
  3. AMIRA: Automated Malware Incident Response & Analysis AMIRA is a service for automatically running the analysis on theOSXCollector output files. The automated analysis is performed viaOSXCollector Output Filters, in particular The One Filter to Rule Them All: the Analyze Filter. AMIRA takes care of retrieving the output files from an S3 bucket, running the Analyze Filter and then uploading the results of the analysis back to S3 (although one could envision as well attaching them to the related JIRA ticket). Prerequisites tox The following steps assume you have tox installed on your machine. If this is not the case, please run: $ sudo pip install tox OSXCollector Output Filters configuration file AMIRA uses OSXCollector Output Filters to do the actual analysis, so you will need to have a valid osxcollector.yaml configuration file in the working directory. The example configuration file can be found in the OSXCollector Output Filters. The configuration file mentions the location of the file hash and the domain blacklists. Make sure that the blacklist locations mentioned in the configuration file are also available when running AMIRA. AWS credentials AMIRA uses boto to interface with AWS. You can supply the credentials using either of the possible boto config files. The credentials should allow reading and deleting SQS messages from the SQS queue specified in the AMIRA config as well as the read access to the objects in the S3 bucket where the OSXCollector output files are stored. To be able to upload the analysis results back to the S3 bucket specified in the AMIRA configuration file, the credentials should also allow write access to this bucket. AMIRA Architecture The service uses the S3 bucket event notifications to trigger the analysis. You will need to configure an S3 bucket for the OSXCollector output files, so that when a file is added there the notification will be sent to an SQS queue (AmiraS3EventNotifications in the picture below). AMIRA periodically checks the queue for any new messages and upon receiving one it will fetch the OSXCollector output file from the S3 bucket. It will then run the Analyze Filter on the retrieved file. The Analyze Filter runs all the filters contained in the OSXCollector Output Filters package sequentially. Some of them communicate with the external resources, like domain and hashes blacklists (or whitelists) and threat intel APIs, e.g. VirusTotal,OpenDNS Investigate or ShadowServer. The original OSXCollector output is extended with all of this information and the very last filter run by the Analyze Filter summarizes all of the findings into a human-readable form. After the filter finishes running, the results of the analysis will be uploaded to the Analysis Results S3 bucket. The overview of the whole process and the system components involved in it are depicted below: Using AMIRA The main entry point to AMIRA is in the amira/amira.py module. You will first need to create an instance of AMIRA class by providing the AWS region name, where the SQS queue with the event notifications for the OSXCollector output bucket is, and the SQS queue name: from amira.amira import AMIRA amira = AMIRA('us-west-1', 'AmiraS3EventNotifications') Then you can register the analysis results uploader, e.g. the S3 results uploader: from amira.s3 import S3ResultsUploader s3_results_uploader = S3ResultsUploader('amira-results-bucket') amira.register_results_uploader(s3_results_uploader) Finally, run AMIRA: amira.run() Go get some coffee, sit back, relax and wait till the analysis results pop up in the S3 bucket! Download: [Hidden Content]
  4. Android tiene un nuevo malware que se distribuye de manera silenciosa, infectando y sustituyendo apps que tienen como fin el robo de datos. El agente Smith es un nombre conocido para muchos que disfrutaron Matrix hace más de 20 años. Hoy toma relevancia ya que así se ha nombrado a un nuevo malware de Android que se comporta de manera similar a como lo hizo el personaje interpretado por Hugo Weaving. De acuerdo con la empresa de seguridad Check Point, Agent Smith ha infectado alrededor de 25 millones de dispositivos Android. El malware se disfraza como una aplicación relacionada con Google y reemplaza otras aplicaciones instaladas con versiones maliciosas que cuentan con código propio. Agent Smith sustituye aplicaciones como WhatsApp de manera silenciosa Los investigadores de Check Point indican que Agent Smith explota la vulnerabilidad de Android conocida como Janus, que permite inyectar malware a las aplicaciones del móvil saltándose un proceso de verificación que compara la firma anterior con la nueva, todo esto de manera silenciosa sin que el usuario pueda darse cuenta. Una de las características de este malware es que muestra anuncios fraudulentos que podrían derivar en un robo de datos del dueño del móvil, como información personal y bancaria. El hecho de atacar y sustituir las aplicaciones instaladas vuelve compleja la tarea de que el usuario pueda combatirlo por su cuenta, por lo que una de las formas de defenderse ante una posible infección es no instalar aplicaciones de fuentes que no sean confiables. Agent Smith ha afectado a más de 25 millones de usuarios, principalmente en India, donde contabiliza 15 millones de dispositivos. El malware se ha extendido a otros países como Pakistán y Bangladesh, aunque también se han reportado casos en Reino Unido y Estados Unidos. La presencia de Agent Smith no es nueva, de hecho se tiene registro desde principios de 2016 cuando apareció en 9Apps, uno de los canales de descarga de aplicaciones más populares de Asia. El malware se ha mantenido vigente durante todo ese tiempo, incluso infectando algunas aplicaciones de la Play Store. Fuente
  5. Price : $194 FREE CUPON Course Language : English [HIDE][Hidden Content]] This course will teach you how hackers create malware and trojans. You will learn how to install the tools that hackers use to create malware. You will discover how to use additional addon programs that hackers will use to create malware. This course will take you on a journey of learning what malware is, how to create malware, how to upload malware to a server, and how a victim will install this malware on their machine and how you can get control over a victim's computer. This course is for educational purposes only and to show you how hackers use freely available tools to create nasty malware that is very difficult for the average user to detect. Once you are able to understand how hackers think, you will be able to use your new skills to continue your learning in ethical hacking and penetration testing.
  6. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  7. dEEpEst

    Fileless malware

    [Hidden Content]
  8. To remove a Trojan, Virus, Worm, or other Malware from Windows, follow these steps: [Hidden Content]
  9. First Android Clipboard Hijacking Crypto Malware Found On Google Play Store February 11, 2019Swati Khandelwal A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users. The malware, described as a "Clipper," masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging to attackers, ESET researcher Lukas Stefanko explained in a blog post. Since cryptocurrency wallet addresses are made up of long strings of characters for security reasons, users usually prefer copying and pasting the wallet addresses using the clipboard over typing them out. The newly discovered clipper malware, dubbed Android/Clipper.C by ESET, took advantage of this behavior to steal users cryptocurrency. To do this, attackers first tricked users into installing the malicious app that impersonated a legitimate cryptocurrency service called MetaMask, claiming to let users run Ethereum decentralized apps in their web browsers without having to run a full Ethereum node. Officially, the legitimate version of MetaMask is only available as a web browser extension for Chrome, Firefox, Opera, or Brave, and is not yet launched on any mobile app stores. However, Stefanko spotted the malicious MetaMask app on Play Store targeting users who want to use the mobile version of the service by changing their legitimate cryptocurrency wallet address to the hacker's own address via the clipboard. As a result, users who intended to transfer funds into a cryptocurrency wallet of their choice would instead make a deposit into the attacker's wallet address pasted by the malicious app. Stefanko spotted the malicious MetaMask app, which he believes was the first Android Trojan Clipper to be discovered on Play Store, shortly after its introduction to the app store on February 1. Google took down the malicious app almost immediately after being notified by the researcher. While the bitcoin price has been dropped steadily since hitting its all-time high in December 2017, there is no reduction (in fact rise) in the cryptocurrency scandals, thefts, and scams that continue to plague the industry. Just last week, The Hacker News reported how customers of the largest Canadian bitcoin exchange QuadrigaCX lost $145 million in cryptocurrency after the sudden death of its owner who was the only one with access to the company's cold (offline) storage wallets. However, some users and researchers are suggesting the incident could be an exit scam.
  10. Malware hunting with live access to the heart of an incident Watch the epidemic as if it was on your computer, but in a more convenient and secure way, with a variety of monitoring features. Realtime interaction Network tracking Process monitoring MITRE ATT&CK™ mapping Behavior graph Video: [Hidden Content] Ex: [Hidden Content] [Hidden Content]
  11. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  12. [HIDE][Hidden Content]]
  13. English: Hello friends! I want to know what books/tutorials/ebooks/etc do you recommend to learn how to create and analyze malware! easy or hard its ok! Thank you so much Spanish: Hola amigos! Estaba buscando libros/ebooks/tutoriales, que recomiendan para leer? En cualquier grado de dificultad! Muchas gracias!
×

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.