Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   w0rm32   /   Page 3
CTB-Locker Ransomware Scripts.

CTB-Locker Ransomware Scripts.

November 21, 2015
w0rm32
Code Scripting, Encryption, Exploits, Penetration Test

NOTE: This Post for Education Purpose and Reverse Engineering Trainer session Only! CTB-locker is a encryption malware belongs to a new generation of ransomware family….

Read Article →
Concept-Rootkit - A simple conceptual linux rootkit.

Concept-Rootkit – A simple conceptual linux rootkit.

November 2, 2015
w0rm32
Networking, Penetration Test

A simple conceptual linux rootkit. how it work: – Hide the module: + Option1: Overwrite “lsmod” + Option2: Delete module listing “rootkit” from modules. –…

Read Article →
Simplebof This is the note of the buffer overflow class.

Simplebof This is the note of the buffer overflow class.

October 17, 2015
w0rm32
Exploits

Simplebof This is the note of the buffer overflow class. Check Environment : – uname -a [Compilations] + With ASLR, Stack protector, DEP, TURNED OFF…

Read Article →
reed is a Reverse Engineering and Exploit Development stuff.

reed is a Reverse Engineering and Exploit Development stuff.

October 12, 2015
w0rm32
Exploits, Penetration Test

reed is a Reverse Engineering and Exploit Development stuff. Latest Change 10/12/2015: Add shellcode execution frames in C# Inside Folder : – mans – templates…

Read Article →
Bruteworm ~ A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines.

Bruteworm ~ A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines.

September 23, 2015
w0rm32
Brute Force, Network Mapping/Scanner, Networking, Penetration Test

Bruteworm is A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines. Inspired from the famous SMB Worm…

Read Article →
Updates Gcat - A fully featured backdoor that uses Gmail as a C&C server.

Updates Gcat – A fully featured backdoor that uses Gmail as a C&C server.

September 12, 2015
w0rm32
Cryptography, Exploits, Penetration Test

Changelog 09/12/2015: + Added some crazy 1337 ascii art. + Added an upload command. Gcat : A stealthy Python based backdoor that uses Gmail as…

Read Article →
Updates Brosec : An interactive reference tool to help security professionals utilize useful payloads and commands.

Updates Brosec : An interactive reference tool to help security professionals utilize useful payloads and commands.

September 9, 2015
w0rm32
Exploits, Penetration Test

Changelog 9/10/2015: + Added two more payloads to Linux > Stealth + Implemented changes to fix + Minor optimizations Roadmap : 0.1a (August 15, 2015)…

Read Article →
Updates Brosec v-0.1a : An interactive reference tool to help security professionals utilize useful payloads and commands.

Updates Brosec v-0.1a : An interactive reference tool to help security professionals utilize useful payloads and commands.

August 15, 2015
w0rm32
Exploits, Penetration Test

Changelog v0.1a (August 15, 2015): + Dependencies — Clipboard +-+ Swapped out xclip for xsel, which seems to work better. Linux users will need to…

Read Article →
← Previous 1 2 3 4 … 7 Next →

Copyright © 2023

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools