Category: Malware Detection


Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

CountermeasuresEXPLOIT-COLLECTORHomeMalware Detection

Malcom – Malware Communication Analyzer

Malcom is a Malware Communication Analyzer designed to analyze a system’s network communication using graphical representations of network traffic, and cross-reference them with known malware sources. This comes handy when analyzing how certain malware species try to communicate with the outside world. Malcom Malware Communication Analyzer Features Malcom can help you: Detect central command and control (C&C) servers Understand peer-to-peer networks Observe DNS fast-flux infrastructures Quickly determine if a network artifact is ‘known-bad’ The aim of Malcom is to make malware analysis and intel…

Malicious MacroMalware AnalysisMalware DetectionNEW TOOLSVba2Graph

Vba2Graph – Generate Call Graphs From VBA Code, For Easier Analysis Of Malicious Documents

A tool for security researchers, who waste their time analyzing malicious Office macros.Generates a VBA call graph, with potential malicious keywords highlighted.Allows for quick analysis of malicous macros, and easy understanding of the execution flow.@MalwareCantFlyFeaturesKeyword highlightingVBA Properties supportExternal function declarion supportTricky macros with "_Change" execution triggersFancy color schemes!ProsPretty fastWorks well on most malicious macros observed in the wildConsStatic (dynamicaly resolved calls would not be recognized)ExamplesExample 1:Trickbot downloader - utilizes object Resize event as initial trigger, followed by TextBox_Change triggers.Example 2:Check out the Examples folder…

Anti-DebuggingAPI TraceBSDC++DrltraceMalware AnalysisMalware DetectionNEW TOOLSPackersProcessesReverse EngineeringYara

Drltrace – A Library Calls Tracer For Windows And Linux Applications

Drltrace is a dynamic API calls tracer for Windows and Linux applications designed primarily for malware analysis. Drltrace is built on top of DynamoRIO dynamic binary instrumentation framework. The release build can be downloaded here.UsageThe usage of drltrace is very simple. A user needs to specify a log directory and a name of a target process in the following way:drltrace -logdir . -- calc.exeThat’s all, the tool will inject required DLLs in the target process, starts instrumentation and in parallel will log information about…

ClamavDetect MalwareDrupalMacMalware DetectionMascNEW TOOLSScanScanner WebWebYara

Masc – A Web Malware Scanner

A malware (web) scanner developed during CyperCamp Hackathon 2017.FeaturesAt the moment, there are some features avaiable for any type of website (custom or CMS) and some of them only available for specific platforms:Scan any website for malware using OWASP WebMalwareScanner checksum, YARA rules databases and ClamAV engine (if available)Perform some cleaning operations to improve website protectionMonitor the website for changes. Details are written in a log fileScan your site to know if it has been infected with some malwareList your local backupsLogging supportBackup your…