Exploits and Exploit kits play a major role in the spread of malware. Learn how they work and how to protect yourself from such threats.
Ransomware became the threats of the web. Learn how they work, their effects, and how to protect yourself from such malware.
Yara has become a pretty popular standard in the Anti-malware industry to write signatures for malware detections. Many Anti-malware vendors, sandboxes vendors, HIPS vendors, CERTs or IT administrators are using rules to either detect malware based on the file, or to analyze network packets and trigger an alert when something malicious occurs. Yara is a…
Get an anti-malware removal report with a very simple cuckoo sandbox customization. Learn how Cuckoo works and how to add custom modules.
Adlice PEViewer is a software used by many researchers at Antivirus companies or CERT worldwide in order to perform malware static analysis. Malicious software sometimes try to hide their goals to evade detection and static analysis. By doing so, they leave indicators, metadatas and suspicious modifications behind. Adlice PEViewer searches and lists these artifacts to…
RunPE: How to hide code behind a legit process – RunPE is a trick used by some malware to hide code into a legit process. Learn how to detect.
LogAnalyzer is a FREE software able to parse and format diagnostic logs, as well as highlight important keywords with different colors. The features are listed below:
MRF (Malware Repository Framework) is a private framework able to centralize all your malware files into the same place, as well as offering file analysis and 3rd party scanners.
PUPs (for potentially unwanted programs) are harmless by design, most of the time. Here we will study a case where such program behaves like a rootkit.
Internet Explorer extensions (BHO) are a very stealth way to inject code in a web browser. Learn how it works to better prevent further infections.