Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'malware'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Dark-wOrm v0.3.2 Preview Download: kosred: [hide][Hidden Content]] upload.ee: [hide][Hidden Content]]
  2. ZerØDay2 RAT Crack PREVIEW *you can put anything for username and password^ DOWNLOAD upload.ee [Hidden Content]
  3. BOZOK RAT 1.5.1 PREVIEW DOWNLOAD kosred: [hide][Hidden Content]] upload.ee: [hide][Hidden Content]]
  4. SUBBUS RAT ORIGINAL .EXE CRACKED .EXE + SOURCE CODE, THEME SOURCE CODE PREVIEW DOWNLOAD upload.ee [Hidden Content]
  5. Los archivos adjuntos son una herramienta comúnmente utilizada por los hackers para distribuir malware. Los archivos adjuntos pueden ser enviados a través de correo electrónico, mensajería instantánea o a través de descargas de sitios web. A menudo, los archivos adjuntos son diseñados para parecerse a documentos legítimos, como facturas o recibos, con el fin de engañar a los usuarios para que hagan clic en ellos y descarguen el malware. Una vez que un usuario ha descargado y abierto un archivo adjunto malicioso, el malware puede infectar su sistema y tener acceso a su información confidencial. El malware también puede utilizar el sistema del usuario como punto de partida para realizar ataques a otros sistemas o para enviar spam. Para protegerse contra los archivos adjuntos maliciosos, es importante ser cauteloso al abrir archivos adjuntos de correos electrónicos o mensajes de personas o empresas desconocidas. También es recomendable utilizar un software de seguridad actualizado y tener precaución al descargar archivos de sitios web sospechosos. En resumen, los archivos adjuntos son una herramienta comúnmente utilizada por los hackers para distribuir malware. Para protegerse contra los archivos adjuntos maliciosos, sé cauteloso al abrir archivos adjuntos de correos electrónicos o mensajes de personas o empresas desconocidas, utiliza un software de seguridad actualizado y ten precaución al descargar archivos de sitios web sospechosos.
  6. IObit Malware Fighter Pro – is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the improved, unique “Dual-Core” engine and the heuristic malware detection, IObit Malware Fighter detects the most complex and deepest spyware and malware in a very fast and efficient way. Features Modules in IObit Malware Fighter Pro: • Startup Guard • Process Guard • Network Guard • File Guard • Cookie Guard • Browser Guard • USB Disk Guard • Malicious Action Guard [Hidden Content] [hide][Hidden Content]]
  7. Glary Malware Hunter Pro – is an anti-virus scanner from Glarysoft for detecting and removing active threats on a Windows system using the Avira engine. Allows you to perform a quick, complete and selective anti-virus scan, as well as scan selected folders and files through the context menu of Windows Explorer. Features • Using anti-virus technologies Avira allows you to detect and remove all types of malware and potential threats. • Fast antivirus scans to instantly check the security status of your system. • An additional level of protection for your main antivirus on Windows. • Disk Cleanup Tool to save disk space and improve PC performance. • PC acceleration tool to optimize startup, scheduled tasks, application services and the system. [Hidden Content] [hide][Hidden Content]]
  8. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. [Hidden Content] [hide][Hidden Content]]
  9. 8 downloads

    How Hackers Create Undetectable Malware and Viruses How Hackers are Bypassing the Majority of Antivirus Software and Creating Malware and Viruses that Are Undetectable Understand What Undetectable Malware is Learn How to Install Python and Pip Install the Veil Framework Understand the Gnome Desktop Install Wine Mono Learn How to Install Metasploit Test the MSF Console Create an Exploit with Veil Test the Exploit on a Windows 10 Machine How to Encrypt the Payload to Avoid Detection Discover How Hackers Take Control of Webcams, Modify Documents and Much More DOWNLOAD: FREE DOWNLOAD USERS PRIV8
    From $110 PRIV8
  10. View File How Hackers Create Undetectable Malware and Viruses How Hackers Create Undetectable Malware and Viruses How Hackers are Bypassing the Majority of Antivirus Software and Creating Malware and Viruses that Are Undetectable Understand What Undetectable Malware is Learn How to Install Python and Pip Install the Veil Framework Understand the Gnome Desktop Install Wine Mono Learn How to Install Metasploit Test the MSF Console Create an Exploit with Veil Test the Exploit on a Windows 10 Machine How to Encrypt the Payload to Avoid Detection Discover How Hackers Take Control of Webcams, Modify Documents and Much More DOWNLOAD: FREE DOWNLOAD USERS PRIV8 Submitter dEEpEst Submitted 16/04/23 Category Libro Online Password ********  
  11. All-in-One malware analysis tool for analyze Windows, Linux, OSX binaries, Document files and APK files. You can get: What DLL files are used. Functions and APIs. Sections and segments. URLs, IP addresses and emails. Android permissions. File extensions and their names. Qu1cksc0pe Can Analyze Currently Files Analysis Type Windows Executables (.exe, .dll, .msi, .bin) Static, Dynamic Linux Executables (.elf, .bin) Static, Dynamic MacOS Executables (mach-o) Static Android Files (.apk, .jar) Static, Dynamic(for now .apk only) Golang Binaries (Linux) Static Document Files (.doc, .docx, .pdf, .xls, .xlsx) Static [hide][Hidden Content]]
  12. Cuckoo VM for Malware Analysis By binaryzone If you do not want to put some time in installing your own Cuckoo Sandbox for different reasons, then you could just download the Virtual Machine (VM) that I have prepared. What I’ve done is get Cuckoo to run in a VM, so you might be asking what does that mean? Well, it means that first Cuckoo is running in a VM and second that Cuckoo will be running its analysis within another VM. Yes, a VM in another VM or what is technically called “Nested Virtualization“. I used VMWare for my VM, but since I’ve exported it to OVA, then you should be good to just import and run. [Hidden Content]
  13. Right click run with powershell enjoy;) for educational purposes only Builder_v1.2.1 - Added support for BTC addresses bc1, tb1, 1 & 3 - Added support for LTC addresses ltc1, M, & L - Added support for ZEC & DOGE (ZEC transparent) - Added random drop to either appdata or temp - Added the ability to generate clipper file with a random name [hide][Hidden Content]] clipper.ps1 - server Scan [Hidden Content]
  14. Graphical interface for PortEx, a Portable Executable and Malware Analysis Library. PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala and targeted at Java applications. Features Header information from MSDOS Header, Rich Header, COFF File Header, Optional Header, Section Table PE Structures: Import Section, Resource Section, Export Section, Debug Section Scanning for file format anomalies, including structural anomalies, and deprecated, reserved, wrong, or non-default values. Visualize file structure, local entropies, and byteplot, and save it as PNG Calculate Shannon Entropy, imphash, MD5, SHA256, Rich and RichPV hash Overlay and overlay signature scanning Version information and manifest [hide][Hidden Content]]
  15. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. [Hidden Content] [hide][Hidden Content]]
  16. IObit Malware Fighter Pro – is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers. With the improved, unique “Dual-Core” engine and the heuristic malware detection, IObit Malware Fighter detects the most complex and deepest spyware and malware in a very fast and efficient way. Features Modules in IObit Malware Fighter Pro: • Startup Guard • Process Guard • Network Guard • File Guard • Cookie Guard • Browser Guard • USB Disk Guard • Malicious Action Guard [Hidden Content] [hide][Hidden Content]]
  17. PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala, and targeted at Java applications. Features Reading header information from: MSDOS Header, COFF File Header, Optional Header, Section Table Reading PE structures: Imports, Resources, Exports, Debug Directory, Relocations, Delay Load Imports, Bound Imports Dumping of sections, resources, overlay, embedded ZIP, JAR or .class files Scanning for file format anomalies, including structural anomalies, deprecated, reserved, wrong or non-default values. Visualize PE file structure, local entropies and byteplot of the file with variable colors and sizes Calculate Shannon Entropy and Chi Squared for files and sections Calculate ImpHash and Rich and RichPV hash values for files and sections Parse RichHeader and verify checksum Calculate and verify Optional Header checksum Scan for PEiD signatures, internal file type signatures or your own signature database Scan for Jar to EXE wrapper (e.g. exe4j, jsmooth, jar2exe, launch4j) Extract Unicode and ASCII strings contained in the file Extraction and conversion of .ICO files from icons in the resource section Extraction of version information and manifest from the file Reading .NET metadata and streams (Alpha) [hide][Hidden Content]]
  18. A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisation Key Features Protect your organization from cybersecurity threats with field-tested strategies Discover the most common ways enterprises initially get compromised Measure the effectiveness of your organization's current cybersecurity program against cyber attacks Book Description After scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more. Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of. The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them. By the end of this book, you will know how to measure the effectiveness of your organization's cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself. What you will learn Discover cybersecurity strategies and the ingredients critical to their success Improve vulnerability management by reducing risks and costs for your organization Learn how malware and other threats have evolved over the past decade Mitigate internet-based threats, phishing attacks, and malware distribution sites Weigh the pros and cons of popular cybersecurity strategies of the past two decades Implement and then measure the outcome of a cybersecurity strategy Learn how the cloud provides better security capabilities than on-premises IT environments Who this book is for This book is designed to benefit engineers, leaders, or any professional with either a responsibility for cyber security within their organization, or an interest in working in this ever-growing field. Table of Contents Ingredients for a Successful Cybersecurity Strategy Using Vulnerability Trends to Reduce Risk and Costs The Evolution of the Threat Landscape – Malware Internet-Based Threats Cybersecurity Strategies Strategy Implementation Measuring Performance and Effectiveness The Cloud - A Modern Approach to Security and Compliance [Hidden Content] [hide][Hidden Content]]
  19. Los archivos adjuntos son una herramienta comúnmente utilizada por los hackers para distribuir malware. Los archivos adjuntos pueden ser enviados a través de correo electrónico, mensajería instantánea o a través de descargas de sitios web. A menudo, los archivos adjuntos son diseñados para parecerse a documentos legítimos, como facturas o recibos, con el fin de engañar a los usuarios para que hagan clic en ellos y descarguen el malware. Una vez que un usuario ha descargado y abierto un archivo adjunto malicioso, el malware puede infectar su sistema y tener acceso a su información confidencial. El malware también puede utilizar el sistema del usuario como punto de partida para realizar ataques a otros sistemas o para enviar spam. Para protegerse contra los archivos adjuntos maliciosos, es importante ser cauteloso al abrir archivos adjuntos de correos electrónicos o mensajes de personas o empresas desconocidas. También es recomendable utilizar un software de seguridad actualizado y tener precaución al descargar archivos de sitios web sospechosos. En resumen, los archivos adjuntos son una herramienta comúnmente utilizada por los hackers para distribuir malware. Para protegerse contra los archivos adjuntos maliciosos, sé cauteloso al abrir archivos adjuntos de correos electrónicos o mensajes de personas o empresas desconocidas, utiliza un software de seguridad actualizado y ten precaución al descargar archivos de sitios web sospechosos. View full article
  20. Book Description The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, the text shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples, and the malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware. Table of Contents 1. Internet and Android OS 2. Android Malware 3. Static Malware Detection 4. Dynamic and Hybrid Malware Detection 5. Detection Using Graph Centrality Measures 6. Graph Convolutional Network for Detection 7. Graph Signal Processing Based Detection 8. System Call Pattern Based Detection 9. Conclusions and Future Directions [Hidden Content] [hide][Hidden Content]]
  21. Windows-Malware-Effects-Remediation-Tool An open-source tool that makes recovering from malware effects - something AVs can't do - MUCH easier. Known Issues When using Windows versions below Windows 10, some of the buttons may be slightly misaligned. I cannot fix this. Requirements Should work on Windows 7, Windows 8.0, Windows 8.1, Windows 10, Windows 11 Works best on Windows 10 and above .NET Framework 4.7.2 or later 32-bit or 64-bit OS [hide][Hidden Content]]
  22. RED TEAM Operator: Malware Development Advanced - Vol.1 Advanced malware development topics for Windows user land only, including: hidden data storage, rootkit techniques, finding privileged objects in system memory, detecting new process creation, generating and handling exceptions, building COFFs and custom RPC-like instrumentation, and more. Welcome to Malware Development Advanced (Vol.1) course! In the previous Intermediate course we covered some of the more advanced malware development topics. This time we will be focusing on extending your payload with additional userland techniques to bury it in the depths of the system. That includes: ways to hide your payload inside NTFS and registry hive learning object enumeration alternatives in the system memory manipulating Process Environment Blocks to hide your module and confuse the potential defender finding .NET process with RWX memory ready to abuse detecting new process creation (from userland) setting up global hooks learning few userland rootkit techniques to hide your files, registry keys and processes abusing memory and hardware breakpoints for hooking hiding payload with Gargoyle and similar techniques creating custom "RPC" allowing to call any API function with any number of parameters in a remote process learning COFF objects, how to build, parse, load and execute them in the memory The course ends with a custom project, employing some of the discussed techniques. You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation. [Hidden Content] [hide][Hidden Content]]
  23. An advanced persistent threat (APT) group of Chinese origin codenamed DiceyF has been linked to a string of attacks aimed at online casinos in Southeast Asia for years. font: [Hidden Content]
  24. Glary Malware Hunter Pro – is an anti-virus scanner from Glarysoft for detecting and removing active threats on a Windows system using the Avira engine. Allows you to perform a quick, complete and selective anti-virus scan, as well as scan selected folders and files through the context menu of Windows Explorer. Features • Using anti-virus technologies Avira allows you to detect and remove all types of malware and potential threats. • Fast antivirus scans to instantly check the security status of your system. • An additional level of protection for your main antivirus on Windows. • Disk Cleanup Tool to save disk space and improve PC performance. • PC acceleration tool to optimize startup, scheduled tasks, application services and the system. [Hidden Content] [hide][Hidden Content]]
  25. Malware Scanner will help you to scan your website with one simple click. It can find both known and unknown viruses, shells, malware, malicious code infections and other website threats. [Hidden Content] [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.