Jump to content

Search the Community

Showing results for tags 'malware'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Los archivos adjuntos son una herramienta comúnmente utilizada por los hackers para distribuir malware. Los archivos adjuntos pueden ser enviados a través de correo electrónico, mensajería instantánea o a través de descargas de sitios web. A menudo, los archivos adjuntos son diseñados para parecerse a documentos legítimos, como facturas o recibos, con el fin de engañar a los usuarios para que hagan clic en ellos y descarguen el malware. Una vez que un usuario ha descargado y abierto un archivo adjunto malicioso, el malware puede infectar su sistema y tener acceso a su información confidencial. El malware también puede utilizar el sistema del usuario como punto de partida para realizar ataques a otros sistemas o para enviar spam. Para protegerse contra los archivos adjuntos maliciosos, es importante ser cauteloso al abrir archivos adjuntos de correos electrónicos o mensajes de personas o empresas desconocidas. También es recomendable utilizar un software de seguridad actualizado y tener precaución al descargar archivos de sitios web sospechosos. En resumen, los archivos adjuntos son una herramienta comúnmente utilizada por los hackers para distribuir malware. Para protegerse contra los archivos adjuntos maliciosos, sé cauteloso al abrir archivos adjuntos de correos electrónicos o mensajes de personas o empresas desconocidas, utiliza un software de seguridad actualizado y ten precaución al descargar archivos de sitios web sospechosos.
  2. Los archivos adjuntos son una herramienta comúnmente utilizada por los hackers para distribuir malware. Los archivos adjuntos pueden ser enviados a través de correo electrónico, mensajería instantánea o a través de descargas de sitios web. A menudo, los archivos adjuntos son diseñados para parecerse a documentos legítimos, como facturas o recibos, con el fin de engañar a los usuarios para que hagan clic en ellos y descarguen el malware. Una vez que un usuario ha descargado y abierto un archivo adjunto malicioso, el malware puede infectar su sistema y tener acceso a su información confidencial. El malware también puede utilizar el sistema del usuario como punto de partida para realizar ataques a otros sistemas o para enviar spam. Para protegerse contra los archivos adjuntos maliciosos, es importante ser cauteloso al abrir archivos adjuntos de correos electrónicos o mensajes de personas o empresas desconocidas. También es recomendable utilizar un software de seguridad actualizado y tener precaución al descargar archivos de sitios web sospechosos. En resumen, los archivos adjuntos son una herramienta comúnmente utilizada por los hackers para distribuir malware. Para protegerse contra los archivos adjuntos maliciosos, sé cauteloso al abrir archivos adjuntos de correos electrónicos o mensajes de personas o empresas desconocidas, utiliza un software de seguridad actualizado y ten precaución al descargar archivos de sitios web sospechosos. View full article
  3. Windows-Malware-Effects-Remediation-Tool An open-source tool that makes recovering from malware effects - something AVs can't do - MUCH easier. Known Issues When using Windows versions below Windows 10, some of the buttons may be slightly misaligned. I cannot fix this. Requirements Should work on Windows 7, Windows 8.0, Windows 8.1, Windows 10, Windows 11 Works best on Windows 10 and above .NET Framework 4.7.2 or later 32-bit or 64-bit OS [hide][Hidden Content]]
  4. RED TEAM Operator: Malware Development Advanced - Vol.1 Advanced malware development topics for Windows user land only, including: hidden data storage, rootkit techniques, finding privileged objects in system memory, detecting new process creation, generating and handling exceptions, building COFFs and custom RPC-like instrumentation, and more. Welcome to Malware Development Advanced (Vol.1) course! In the previous Intermediate course we covered some of the more advanced malware development topics. This time we will be focusing on extending your payload with additional userland techniques to bury it in the depths of the system. That includes: ways to hide your payload inside NTFS and registry hive learning object enumeration alternatives in the system memory manipulating Process Environment Blocks to hide your module and confuse the potential defender finding .NET process with RWX memory ready to abuse detecting new process creation (from userland) setting up global hooks learning few userland rootkit techniques to hide your files, registry keys and processes abusing memory and hardware breakpoints for hooking hiding payload with Gargoyle and similar techniques creating custom "RPC" allowing to call any API function with any number of parameters in a remote process learning COFF objects, how to build, parse, load and execute them in the memory The course ends with a custom project, employing some of the discussed techniques. You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation. [Hidden Content] [hide][Hidden Content]]
  5. An advanced persistent threat (APT) group of Chinese origin codenamed DiceyF has been linked to a string of attacks aimed at online casinos in Southeast Asia for years. font: [Hidden Content]
  6. Glary Malware Hunter Pro – is an anti-virus scanner from Glarysoft for detecting and removing active threats on a Windows system using the Avira engine. Allows you to perform a quick, complete and selective anti-virus scan, as well as scan selected folders and files through the context menu of Windows Explorer. Features • Using anti-virus technologies Avira allows you to detect and remove all types of malware and potential threats. • Fast antivirus scans to instantly check the security status of your system. • An additional level of protection for your main antivirus on Windows. • Disk Cleanup Tool to save disk space and improve PC performance. • PC acceleration tool to optimize startup, scheduled tasks, application services and the system. [Hidden Content] [hide][Hidden Content]]
  7. IObit Malware Fighter 9 All-Around PC Protection with Powerful Anti-Malware and the Strongest Privacy Solutions Real-Time Threats Blocking Prevention is better than cure. Compared to a manual scan, IObit Malware Fighter 9’s real-time protection will automatically scan and prevent malware before it’s installed on your computer. You will be fully protected when using your device at any time. The best free malware removal constantly protects you against any PC threats like virus, ransomware, spyware, Trojans, adware and worms etc., even the newest malware, such as coronavirus-themed related malware. Besides, the IObit Anti-ransomware engine collaborates with the Bitdefender engine to offer multi-core protection. Privacy Protection Your private and sensitive data can be locked securely in the safe box of IObit Malware Fighter 9 too. Just set a password and put your important data into it, nobody is permitted to get access except yourself. IObit Malware Fighter creates an isolated environment to safely execute unknown apps and suspicious software to avoid damages. Meanwhile, the anti-ransomware engine in data protection of this malware removal tool gives an extra layer of protection for your privacy. It intelligently prevents all your files from any ransomware. Powerful Browser Protection IObit Malware Fighter helps you to stay away from phishing websites, prevent your homepage from being modified for any malicious use, keep you away from lots of annoying ads, and clear those tracking cookies automatically. In addition, the advanced Email Protection protects your web emails against spam, phishing scams, and other email-borne threats when you open an email in the browser. IObit Malware Fighter is to guarantee your daily surfing for both work and entertainment. Multi-Platform Security Guards IObit Malware Fighter even gives you multi-layers of protection. It accelerates a secure startup, stops any malicious process running in RAM, blocks those unknown programs for unauthorized access, and avoids virus infection when inserting a USB flash drive or an external hard drive. And the newly added Behavior Guard feature warns of potential threats or suspected viruses in advance. Your computer is protected step by step with comprehensive security guards. [Hidden Content] [hide][Hidden Content]]
  8. A machine learning malware analysis framework for Android apps. DroidDetective is a Python tool for analysing Android applications (APKs) for potential malware related behaviour and configurations. When provided with a path to an application (APK file) Droid Detective will make a prediction (using it's ML model) of if the application is malicious. Features and qualities of Droid Detective include: Analysing which of ~330 permissions are specified in the application's AndroidManifest.xml file. Analysing the number of standard and proprietary permissions in use in the application's AndroidManifest.xml file. Using a RandomForest machine learning classifier, trained off the above data, from ~14 malware families and ~100 Google Play Store applications. [hide][Hidden Content]]
  9. Description *Get the Official Certificate after Completing the Course Learn Malware Analysis and Reverse Engineering Deeply with CRMA+ 2022 Course. Breaking something down and putting it back together is a process that helps people understand how things were made. A person would be able to redo and reproduce an origami by unfolding it first. Knowing how cars work requires understanding each major and minor mechanical part and their purposes. The complex nature of the human anatomy requires people to understand each and every part of the body. How? By dissecting it. Reverse engineering is a way for us to understand how things were designed, why is it in its state, when it triggers, how it works, and what its purpose is. In effect, the information is used to redesign and improve for better performance and cost. It can even help fix defects. It is amazing, and rather disconcerting, to realize how much software we run without knowing for sure what it does. We buy software off the shelf in shrink wrapped packages. We run setup utilities that install numerous files, change system settings, delete or disable older versions and superseded utilities, and modify critical registry files. Every time we access a Website, we may invoke or interact with dozens of programs and code segments that are necessary to give us the intended look, feel, and behaviour. We purchase CDs with hundreds of games and utilities or download them as shareware. We exchange useful programs with colleagues and friends when we have tried only a fraction of each program’s features. Then, we download updates and install patches, trusting that the vendors are sure that the changes are correct and complete. We blindly hope that the latest change to each program keeps it compatible with all of the rest of the programs on our system. We rely on much software that we do not understand and do not know very well at all. I refer to a lot more than our desktop or laptop personal computers. The concept of ubiquitous computing, or “software everywhere,” is rapidly putting software control and interconnection in devices throughout our environment. The average automobile now has more lines of software code in its engine controls than were required to land the Apollo astronauts on the Moon. Malware analysis is the study of malware’s behaviour. The objective of malware analysis is to understand the working of malware and how to detect and eliminate it. It involves analysing the suspect binary in a safe environment to identify its characteristics and functionalities so that better defences can be built to protect an organization’s network. Imagine if the Trojan Horse was thoroughly inspected and torn down before it was allowed to enter the gates of a city. This would probably cause a few dead soldiers outside the gate fighting for the city. The next time the city is sent another Trojan Horse, archers would know where to point their arrows. And no dead soldiers this time. The same is true for malware analysis—by knowing the behaviours of a certain malware through reverse engineering, the analyst can recommend various safeguards for the network. Think of it as the Trojan Horse being the malware, the analyst being the soldier who initially inspected the horse, and the city being the network of computers. Who this course is for: Beginner Reverse Engineers who curious about learning Reverse Engineering Beginner Malware Analyst who curious about learning Malware Analysis Requirements Basic Computer Understanding [Hidden Content] [Hidden Content]
  10. PHP malware scanner Traversing directories for files with php extensions and testing files against text or regexp rules, the rules-based on self-gathered samples and publicly available malwares/webshells. The goal is to find infected files and fight against kiddies, because too easy to bypass rules. Changelog v1.0.14 Backdoor reported in #72 [hide][Hidden Content]]
  11. Malware Hunter Pro Ultimate virus detection and protection capabilities. Detects and removes stubborn malware that can cause potential danger. Cleans disk and speeds up your PC. Anti-Virus + PC Optimization Real-time protection for your PC, always keep it up-to-date and secure. PC optimization tools were added, clean the disk and speed up your computer. [Hidden Content] [hide][Hidden Content]]
  12. CAPE is a malware sandbox. It was derived from Cuckoo with the goal of adding automated malware unpacking and config extraction - hence its name is an acronym: 'Config And Payload Extraction'. Automated unpacking allows classification based on Yara signatures to complement network (Suricata) and behavior (API) signatures. [hide][Hidden Content]]
  13. DRAKVUF Sandbox is an automated black-box malware analysis system with a DRAKVUF engine under the hood. This project provides you with a friendly web interface that allows you to upload suspicious files to be analyzed. Once the sandboxing job is finished, you can explore the analysis result through the mentioned interface and get insight on whether the file is truly malicious or not. Because it is usually pretty hard to set up a malware sandbox, this project also provides you with an installer app that would guide you through the necessary steps and configure your system using settings that are recommended for beginners. At the same time, experienced users can tweak some settings or even replace some infrastructure parts to better suit their needs. Supported hardware&software In order to run DRAKVUF Sandbox, your setup must fullfill all of the listed requirements: Processor: Intel processor with VT-x and EPT features Host system: Debian 10 Buster/Ubuntu 18.04 Bionic/Ubuntu 20.04 Focal with at least 2 core CPU and 5 GB RAM Guest system: Windows 7 (x64), Windows 10 (x64; experimental support) Nested virtualization: KVM does work, however it is considered experimental. If you experience any bugs, please report them to us for further investigation. Due to lack of exposed CPU features, hosting drakvuf-sandbox in cloud is not supported (although it might change in the future) Hyper-V does not work Xen does work out of the box VMware Workstation Player does work, but you need to check Virtualize EPT option for a VM; Intel processor with EPT still required [hide][Hidden Content]]
  14. Malware Hunter Pro Detects and removes stubborn malware that can cause potential danger. Constantly updated malware database. Cleans disk and speeds up your PC. Anti-Malware + PC Optimization Great companion to antivirus software such as Microsoft Defender. Real-time protection for your PC. Clean the disk and speed up your computer. [Hidden Content] [hide][Hidden Content]]
  15. 10 downloads

    Build Undetectable Malware Using C Language Ethical Hacking 🔅What you'll learn? 🔹 You Will Learn To Code Your Own Penetration Testing Tools. 🔸 You Will Learn Ethical Hacking Using C language. 🔹You Will Learn How To Hack Windows 10 Using Your Own Tool. 🔸 You Will Learn How The Keylogger In C Works. 🔹 You Will Learn Malware Development, And More With Video Tutorials. Tutorial Link: download Free for users PRIV8
    $110 PRIV8
  16. View File Build Undetectable Malware Using C Language Ethical Hacking [2.3GB] Build Undetectable Malware Using C Language Ethical Hacking 🔅What you'll learn? 🔹 You Will Learn To Code Your Own Penetration Testing Tools. 🔸 You Will Learn Ethical Hacking Using C language. 🔹You Will Learn How To Hack Windows 10 Using Your Own Tool. 🔸 You Will Learn How The Keylogger In C Works. 🔹 You Will Learn Malware Development, And More With Video Tutorials. Tutorial Link: download Free for users PRIV8 Submitter dEEpEst Submitted 16/01/22 Category Libro Online Password ********  
  17. Malware Hunter Pro Detects and removes stubborn malware that can cause potential danger. Constantly updated malware database. Cleans disk and speeds up your PC. Anti-Malware + PC Optimization Great companion to antivirus software such as Microsoft Defender. Real-time protection for your PC. Clean the disk and speed up your computer. [Hidden Content] [hide][Hidden Content]]
  18. TokenGuard, protect your account, prevent token steal. Totally free and open source. TokenGuard is a program written in Python that aims to mitigate almost 100% the theft of Discord Tokens on your computer. The main features are: Simple GUI: TokenGuard has a graphic interface that is too simple, not very invasive and easy to use, which aims to adapt to all types of users. Constant Protection: The program is in charge of cleaning the traces of the Discord Token constantly, guaranteeing its safety at all times. Low Consumption: Despite the fact that it is constantly running, the consumption of both the CPU and RAM is very low.. [hide][Hidden Content]]
  19. WINZIP MALWARE PROTECTOR Get 24 hour maximum security for your PC. Keep it safe from malware attacks and security threats. Automatically seek and destroy all security threats Vault-strength protection prevents spyware, adware, trojans and worms Round the clock updates to keep your PC and personal data secure Malware Protector will thoroughly scan and accurately identify even the smallest of vulnerabilities. Then it swiftly moves into action and removes these threats and prevents recurring attacks. [Hidden Content]] [hide][Hidden Content]]
  20. Malware Hunter Pro Detects and removes stubborn malware that can cause potential danger. Constantly updated malware database. Cleans disk and speeds up your PC. Protects your computer from malware and optimizes your computer performance Malware Scan Scan your computer quickly and thoroughly. Detect and remove stubborn malware to prevent potential danger. Support scheduled scan to save your time. Speed Up Help you optimize your system to speed up and boost your computer performance. Disk Cleaner Clean up temporary & unnecessary files. Remove unneeded documents to save computer storage space. Process Protection Protect your PC from malware, such as Trojan, worms, spyware, and other online threats. [Hidden Content] [hide][Hidden Content]]
  21. Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service. Adding New Hash Algorithms The hash algorithm database is open source and new algorithms can be added on GitHub here. Pull requests are mostly automated and as long as our automated tests pass the new algorithm will be usable on HashDB within minutes. Installing HashDB Before using the plugin you must install the python requests module in your IDA environment. The simplest way to do this is to use pip from a shell outside of IDA. (pip install requests) Once you have the requests module installed simply copy the latest release of hashdb.py into your IDA plugins directory and you are ready to start looking up hashes! Use HashDB can be used to look up strings that have been hashed in malware by right-clicking on the hash constant in the IDA disassembly view and launching the HashDB Lookup client. Settings Before the plugin can be used to look up hashes the HashDB settings must be configured. The settings window can be launched from the plugins menu Edit->Plugins->HashDB. [hide][Hidden Content]]
  22. IObit Malware Fighter 9 All-Around PC Protection with Powerful Anti-Malware and the Strongest Privacy Solutions Real-Time Threats Blocking Prevention is better than cure. Compared to a manual scan, IObit Malware Fighter 9’s real-time protection will automatically scan and prevent malware before it’s installed on your computer. You will be fully protected when using your device at any time. The best free malware removal constantly protects you against any PC threats like virus, ransomware, spyware, Trojans, adware and worms etc., even the newest malware, such as coronavirus-themed related malware. Besides, the IObit Anti-ransomware engine collaborates with the Bitdefender engine to offer multi-core protection. Privacy Protection Your private and sensitive data can be locked securely in the safe box of IObit Malware Fighter 9 too. Just set a password and put your important data into it, nobody is permitted to get access except yourself. IObit Malware Fighter creates an isolated environment to safely execute unknown apps and suspicious software to avoid damages. Meanwhile, the anti-ransomware engine in data protection of this malware removal tool gives an extra layer of protection for your privacy. It intelligently prevents all your files from any ransomware. Powerful Browser Protection IObit Malware Fighter helps you to stay away from phishing websites, prevent your homepage from being modified for any malicious use, keep you away from lots of annoying ads, and clear those tracking cookies automatically. In addition, the advanced Email Protection protects your web emails against spam, phishing scams, and other email-borne threats when you open an email in the browser. IObit Malware Fighter is to guarantee your daily surfing for both work and entertainment. Multi-Platform Security Guards IObit Malware Fighter even gives you multi-layers of protection. It accelerates a secure startup, stops any malicious process running in RAM, blocks those unknown programs for unauthorized access, and avoids virus infection when inserting a USB flash drive or an external hard drive. And the newly added Behavior Guard feature warns of potential threats or suspected viruses in advance. Your computer is protected step by step with comprehensive security guards. [Hidden Content] [hide][Hidden Content]]
  23. Skrull There is a well-known feature by which anti-virus or EDR can capture ambiguous or suspicious program files and send them back to security response center for researcher analysis. For malware designers, playing cat and mouse with security solutions in the post exploitation stage while hiding their backdoors from malware detection and forensics is a crucial mental challenge. Many methods used in the wild by hackers against researchers have already been discussed, for example using a COM hijack to obscure their malware, deploying a kernel hook-based rootkit, bypassing signature-based scanning, and others besides. There’s still no method robust enough to counter these techniques, as researchers often cannot totally understand how the malware works internally even if it’s caught and analyzed. Imagine a situation: malware acquires DRM protection, and thereby naturally damages itself when copied from the infected machine. Is it possible? How would it happen? In short, security vendors should be prepared to handle this situation within the Maginot line of their own defenses. Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers that can run malware on the victim using the Process Ghosting technique. Also, launchers are totally anti-copy and naturally broken when got submitted. Skrull ( v1.0BETA ) Latest [+] only support 64-bit PE right now. [hide][Hidden Content]]
  24. Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service. Adding New Hash Algorithms The hash algorithm database is open source and new algorithms can be added on GitHub here. Pull requests are mostly automated and as long as our automated tests pass the new algorithm will be usable on HashDB within minutes. Installing HashDB Before using the plugin you must install the python requests module in your IDA environment. The simplest way to do this is to use pip from a shell outside of IDA. (pip install requests) Once you have the requests module installed simply copy the latest release of hashdb.py into your IDA plugins directory and you are ready to start looking up hashes! 1.7.1 Latest What's Changed Fixed compatibility with Python 3.6, bumped version by @anthonyprintup in #22 [hide][Hidden Content]]
  25. Malware Hunter Pro Ultimate virus detection and protection capabilities. Detects and removes stubborn malware that can cause potential danger. Cleans disk and speeds up your PC. Anti-Virus + PC Optimization Real-time protection for your PC, always keep it up-to-date and secure. PC optimization tools were added, clean the disk and speed up your computer. [Hidden Content] [hide][Hidden Content]]

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.