Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Malware Reverse Engineering

Debugging, disassembling and documenting interesting malware...

  1. ramtin
    Started by ramtin,

    Hi anyone know somethings about "Beijing-based KnownSec" that want to share it's malware db? see below link http://www.first.org.../20090703a.html or http://www.cio.co.uk...rity-companies/ please help me to find this database!!!

    • 2 replies
    • 6k views
  2. CodeXpert
    Started by CodeXpert,

    As descriped above in the title.. How Anti-Malware Applications Work ? How does it find the sign. for specific malware. And a cerious question is how scan works.. It is very fast so it approximately not searching in databases >?! Any comments will be appreciated

    • 1 reply
    • 6.6k views
  3. PaperBall
    Started by PaperBall,

    Anyone have a copy of this new malware that was discovered last week?

    • 10 replies
    • 8.6k views
  4. STRELiTZIA
    Started by STRELiTZIA,

    Using Exception Table hook to spread malicious code, paper by Peter Ferrie. http://pferrie.host22.com/papers/holey.pdf

    • 0 replies
    • 5k views
  5. linuscomex
    Started by linuscomex,

    Hi all please help me to virus reverse engineering and find virus source code Through reverse engineering

      • Like
    • 8 replies
    • 8k views
  6. CodeExplorer
    Started by CodeExplorer,

    .NET/MSIL Malicious Code and AV/Heuristic Engines />http://www.symantec.com/connect/articles/netmsil-malicious-code-and-avheuristic-engines Nice article; the only thing nice from Symantec

    • 2 replies
    • 6.9k views
  7. lr300
    Started by lr300,

    Does anyone have any archive of this great site? I've bought Subverting the Windows Kernel book but without sources from site the book is only partially useful. Please help. Thanks in advance.

    • 1 reply
    • 6.7k views
    abhijit mohanta
  8. Teddy Rogers
    Started by Teddy Rogers,

    IEEE Software Taggant System For Exposing Malware Creators Well... I have been hearing and reading about this everywhere for a while now. Numerous packer and protector developers have already been trumping this up as the bee-all for software developers who use their packer/protector products as a means to stop false positives and at the same time be used to identify/flag stolen or bogus protector licences used on files. For those who do not know (yet) if it becomes standard we may see this being common place. />http://standards.ieee.org/news/2011/icsg_software.html How practical and to what purpose it will end up serving exactly I still have doubts to. Have a read and…

    • 12 replies
    • 9.4k views
  9. CodeExplorer
    Started by CodeExplorer,

    Virus Bulletin Jully 2011 />http://www.sysreveal.com/uploads/vb/VBJuly2011.pdf

    • 0 replies
    • 4.7k views
  10. ltheonel
    Started by ltheonel,

    Since noboy is interested, thread can be deleted please. zbot.zip

    • 2 replies
    • 5.3k views
  11. C0M3ND4D0R
    Started by C0M3ND4D0R,

    A collection of (so far) 6 magazines HITB.......on malware analysis and exploiting among other issues free distribution http://magazine.hackinthebox.org/hitb-magazine.html

    • 0 replies
    • 16.2k views
  12. Sina_DiR
    Started by Sina_DiR,

    This is the new trick in Unicode string that could deceive users to open and exe file that showing pdf txt etc. It could be new way to spammers For more information check out F-Secure analyze: Redirect to F-Secure

    • 6 replies
    • 6.4k views
  13. malfreak
    Started by malfreak,

    I downloaded stuxnet from http://tuts4you.com/download.php?view.3011. The files seem valid as I scanned the contents at virustotal. Then I inserted a flash drive and executed the dropper.exe file. According to Microsoft (http://blogs.technet.com/b/mmpc/archive/2010/07/16/the-stuxnet-sting.aspx), the dropper (TrojanDropper:Win32/StuxnetA) should drop the following into the system: Worm:Win32/Stuxnet.A Trojan:WinNT/Stuxnet.A Trojan:WinNT/Stuxnet.B (initially called VirTool:WinNT/Rootkitdrv.HK) Trojan:Win32/Stuxnet.A Worm:Win32/Stuxnet.B Although, it seemed to have triggered some components of stuxnet,(the shortcut and tmp files got hidden, so the rootkit was on its way) I a…

    • 1 reply
    • 5.9k views
  14. Teddy Rogers
    Started by Teddy Rogers,

    Honeynet Project Challenge 9 Submissions to be submitted by September 4th 2011. https://www.honeynet.org/node/751 http://malphx.free.f...es-final.tar.gz Ted.

    • 1 reply
    • 5.2k views
  15. mudlord
    Started by mudlord,

    A nice paper I found on the utter trash that is Sophos.... />http://lock.cmpxchg8b.com/Sophail.pdf Sophail.pdf

    • 0 replies
    • 4.9k views
  16. CodeExplorer
    Started by CodeExplorer,

    Joebox Joebox is an extensive runtime analysis system. It is designed for automatic runtime analysis of malware and other software on Windows based operating systems. Joebox executes a potential malicious program on a full Windows system and observes the behavior of the program during execution. It manages the complete analysis cycle automatically. Link: />http://www.joebox.ch/

    • 2 replies
    • 8.1k views
  17. Teddy Rogers
    Started by Teddy Rogers,

    />http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1 Ted.

    • 2 replies
    • 4.9k views
  18. CodeExplorer
    Started by CodeExplorer,

    Patent application title: Heuristic detection of malicious code />http://www.faqs.org/patents/app/20090013405

    • 1 reply
    • 6.5k views
  19. News Feeder
    Started by News Feeder,

    The following statistics were compiled in June using data from computers running Kaspersky Lab products: 249,345,057 network attacks blocked. View the full article

    • 1 reply
    • 8.3k views
  20. tukki_2020
    Started by tukki_2020,

    Hey guys, i just want to brainstorm an idea so please be patient. I have made a c-program which writes all the images(rgb content) in a folder to a structure in another c-file( along with the needed code to compile and execute) and deletes the images. Now if i compile and run the new .c-file, i am able to restore these images lets say on providing a password or something. But of-course i need a c-compiler to do the compiling. So i have the question: 1.> I want to make it independent in the sense that i want the compiler to travel with the original exe file and later when needed it compiles the second c-file that contains the structure for the images. Is it possible? t…

    • 3 replies
    • 7k views
  21. GoJonnyGo
    Started by GoJonnyGo,

    Hi there, i am wondering, how antivirus systems can find viruses in packed software. Do they know every unpacking routine and first look at with with protector it is packed and unpack it then to perform a search or do they wait till the exe unpacked itself and is on oep or how does this happen?

      • Like
    • 11 replies
    • 10.7k views
  22. Guest zikmik
    Started by Guest zikmik,

    First Public Release of BlackHole Exploit Kit. BlackHole exploit kit is yet another in an ongoing wave of attack toolkits flooding the underground market. The kit first appeared on the crimeware market in September of 2010 and ever since then has quickly been gaining market share over its vast number of competitors. In fact, many antivirus vendors now claim that this is one of the most prevalent exploit kits used in the wild. Even Malware Domain List is showing quite a few domains infected with the BlackHole exploit kit. Black Market Cost : Users can purchase the annual license for $1500, semi-annual license for $1000, or just a quarterly license for $700. The license inc…

      • Like
    • 3 replies
    • 8k views
    CodeExplorer
  23. deepzero
    Started by deepzero,

    just saw that Comodo offers an automated malware analysis service: http://camas.comodo.com/cgi-bin/submitwhich indeed seems to output lots of interesting information.

    • 0 replies
    • 4.4k views
  24. Pooya
    Started by Pooya,

    Hi Guys As I've been searching through this topic , I've got some interesting picture aside of VM Fingerprints.... like I/O Backdoor in VMware... but my main question is that how to find a way like VMware Method ? I've read that the more reliable technique for detecting is relying on assembly-level code that behaves differently in VM... so how can I observe this behavior ??? Any little tiny clue would be appreciated Best Regards

    • 1 reply
    • 7k views
  25. frank_boldewin
    Started by frank_boldewin,

    Here are the slides to my talk "Hunting rootkits with Windbg" at the Ruhr University of Bochum yesterday. I'll introduce several ways to find well known rootkits like Rustock or TDL Versions 3+4 with Windbg and scripts. Enjoy! Paper The Windbg script shown in the slides to grab Kernelcallbacks can be found here: Windbg Script

    • 2 replies
    • 7.9k views

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.