Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Mr.Trojans   /   Page 8
Updates Windows-Exploit-Suggester revision v-2.5.

Updates Windows-Exploit-Suggester revision v-2.5.

May 18, 2015
Mr.Trojans
Exploits

Changelog 18/05/2015 revision v-2.5: – Adding local priv ms15-051 – added duplicates flag that can allow for bulletins to be displayed multiple times. this will…

Read Article →
Exploits that are mostly ready to use.

Exploits that are mostly ready to use.

May 11, 2015
Mr.Trojans
Exploits

Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional. To check md5sum in linux,…

Read Article →
Demon - A Stealthy GPU-based Keylogger Poc.

Demon – A Stealthy GPU-based Keylogger Poc.

May 3, 2015
Mr.Trojans
Exploits

GPU-BASED KEYLOGGING is A GPU-assisted malware binary contains code destined to run on different processors. Upon execution, the malware loads the device-specific code on the GPU,…

Read Article →
Updates Exploits v-25.04.15 - Miscellaneous proof of concept exploit code.

Updates Exploits v-25.04.15 – Miscellaneous proof of concept exploit code.

April 25, 2015
Mr.Trojans
Denial Of Service/Floods, Exploits, Penetration Test

Changelog and tool added 25/04/2015: + Exploit for Seowintech Routers diagnostic.cgi Unauthenticated Remote Root Code Execution. Miscellaneous proof of concept exploit code written at Xiphos…

Read Article →
VolDiff - Malware Memory Footprint Analysis.

VolDiff – Malware Memory Footprint Analysis.

April 19, 2015
Mr.Trojans
Anti Malware/Virus - Malware Analysis, Security Tools

VolDiff is a bash script that runs Volatility plugins against memory images captured before and after malware execution. It creates a report that highlights system…

Read Article →
Updates RATDecoders : Python Decoders for Common Remote Access Trojans.

Updates RATDecoders : Python Decoders for Common Remote Access Trojans.

April 4, 2015
Mr.Trojans
Anti Malware/Virus - Malware Analysis, Security Tools

Change and updates 04.03.2015 jRat Rat Config Extractor : +__description__ = ‘jRat Rat Config Extractor’ +__author__ = ‘Kevin Breen http://techanarchy.net http://malwareconfig.com’ +__version__ = ‘0.3’ +__date__ =…

Read Article →
Maldrolyzer - Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)

Maldrolyzer – Simple framework to extract “actionable” data from Android malware (C&Cs, phone numbers etc.)

March 30, 2015
Mr.Trojans
Android Tools, Anti Malware/Virus - Malware Analysis, Framework

Maldrolyzer is a Simple framework to extract “actionable” data from Android malware (C&Cs, phone numbers etc.) Changelog 30.03.2015 : + Templates.py ; Modules + maldrolyzer.py…

Read Article →
Androtools is a Android malware static & dynamic analysis and automated action.

Androtools is a Android malware static & dynamic analysis and automated action.

March 22, 2015
Mr.Trojans
Android Tools, Anti Malware/Virus - Malware Analysis, Mobile Applications Tools

androtools is Android malware static & dynamic analysis tool optimized for automated analysis. This work was motivated observing real-world needs for Police Officer and Malware…

Read Article →
← Previous 1 … 7 8 9 10 Next →

Copyright © 2023

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools