Bookmarks - wr0ng.nameShaared links2020-09-28T19:14:05+02:00http://links.wr0ng.name/http://links.wr0ng.name/http://links.wr0ng.name/ShaarliTHREAT MAP by LookingGlasshttp://links.wr0ng.name/?BljjWw2020-07-16T14:20:05+02:002020-09-28T19:14:05+02:00
With a scalable solutions portfolio of threat data feeds, a threat intelligence management platform, threat mitigation solutions, and threat intelligence services, LookingGlass enables security teams to prevent, detect, understand, and respond to analyzed, prioritized, relevant threats.Additionally, with a deep knowledge of the global Internet topology and near real time activity, LookingGlass helps organizations understand threats inside and outside their perimeter - including threats that may be impacting third party trusted partners, other organizations in their industry, and the latest threat trends impacting the global Internet at large.
— Direct link]]>Malpedia (Fraunhofer FKIE)http://links.wr0ng.name/?bbjR2A2020-07-06T09:22:59+02:002020-07-06T09:22:59+02:00
Administration is lead by Daniel Plohmann and Steffen Enders.
Mission Statement
The primary goal of Malpedia is to provide a resource for rapid identification and actionable context when investigating malware. Openness to curated contributions shall ensure an accountable level of quality in order to foster meaningful and reproducible research.
Please respect the Terms of Service.
Also, please be aware that not all content on Malpedia is publicly available.
More specifically, you will need an account to access all data (malware samples, non-public YARA rules, ...).
In this regard, Malpedia is operated as an invite-only trust group.
— Direct link]]>URL and website scanner - urlscan.iohttp://links.wr0ng.name/?3inxsg2019-10-25T14:48:41+02:002019-10-25T14:48:41+02:00
Finally, urlscan.io will try to make a verdict whether the scanned website is considered malicious or suspicious. If the site is targeting the users one of the almost 400 brands tracked by urlscan.io, this will be shown in the scan results.
— Direct link]]>Docs - ANY.RUNhttp://links.wr0ng.name/?gH8Jag2018-09-24T15:39:02+02:002018-09-24T15:39:02+02:00— Direct link]]>Ransomware Overviewhttp://links.wr0ng.name/?9i2fsw2018-08-21T16:39:26+02:002018-08-21T16:39:26+02:00— Direct link]]>RE for Beginners | Reverse Engineeringhttp://links.wr0ng.name/?DLJe6A2018-07-02T10:37:17+02:002018-07-02T10:37:17+02:00
If you have been searching for a place to get started with
Reverse Engineering and get your hands dirty - you are in the right place :)
— Direct link]]>Automated Malware Analysis - Joe Sandbox Cloud Basichttp://links.wr0ng.name/?jWwvlA2018-06-22T10:59:06+02:002018-06-22T10:59:06+02:00— Direct link]]>Welcome to Robtex!http://links.wr0ng.name/?I3QnFg2018-06-15T16:41:37+02:002018-06-15T16:41:37+02:00
We aim to make the fastest and most comprehensive free DNS lookup tool on the Internet.
Our database now contains billions of documents of internet data collected over more than a decade.
— Direct link]]>Threat Crowd | Threatcrowd.org Open Source Threat Intelligencehttp://links.wr0ng.name/?U1u7lw2018-06-14T10:34:07+02:002018-06-14T10:34:07+02:00— Direct link]]>Introduction à l'analyse des malwares - OVH Meetup - YouTubehttp://links.wr0ng.name/?66b7UA2018-03-23T15:31:22+01:002018-03-23T15:31:22+01:00— Direct link]]>WEBINAR: Threat Hunting: Beyond Alerts & IOCs - YouTubehttp://links.wr0ng.name/?SoOmxg2018-03-09T11:32:52+01:002018-03-09T11:32:52+01:00— Direct link]]>(78) Прикриттям наймасштабнішої кібератаки в історії України став вірус Diskcoder.C - YouTubehttp://links.wr0ng.name/?toKGrw2017-07-07T17:07:02+02:002017-07-07T17:07:02+02:00
Comment: Yaroslav Trakalo, spokesman for the National Police of Ukraine
Коментар: Ярослав Тракало, речник Національної поліції України
— Direct link]]>VirusShare.comhttp://links.wr0ng.name/?d3NZJg2017-07-05T10:19:06+02:002017-07-05T10:19:06+02:00— Direct link]]>VirusTotal Intelligence - Your malware research telescope (login required)http://links.wr0ng.name/?GjpjPA2017-07-04T12:29:22+02:002017-07-04T12:29:22+02:00
In order to ease the use of the application we have classified the search queries and modifiers into the following categories, you can combine any number of them in the same query, moreover, you can use AND, OR and NOT operators to tweak your searches.
— Direct link]]>Sucuri SiteCheck - Free Website Malware Scannerhttp://links.wr0ng.name/?vkuORQ2017-06-30T16:24:00+02:002017-06-30T16:24:00+02:00
Enter a URL (ex. sucuri.net) and the Sucuri SiteCheck scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.
— Direct link]]>Free Automated Malware Analysis - File Analyzerhttp://links.wr0ng.name/?YgNi_g2017-06-30T16:14:12+02:002017-06-30T16:14:12+02:00
.exe (Executables, GUI, CUI, and all variants like PIF, SCR, CPL etc)
.dll (Dynamic Link Libraries)
.vbs (Script files like JS, JSE, VBS, VBE, PS1, PS2, CHM etc)
.any (Available in Pro Version)
File Analyzer is based on Joe Sandbox Desktop which performs deep malware analysis. Compared to others Joe Sandbox performs static, dynamic, graph and hybrid analysis to get the most in-depth analysis possible. The captured behavior is rated and classified by one of the biggest behavior signature sets.
What about evasive malware? Joe Sandbox Desktop is the only solution which uses novel graph based algorithms to detect and spot evasive behavior. Checkout the behavior and execution graphs in the reports. To leave malware no choice for VM detection Joe Sandbox Desktop enables to analyze on bare-metal machines (e.g. on a Laptop or PC from your environment).
— Direct link]]>Automated Malware Analysis - Joe Sandbox Reportshttp://links.wr0ng.name/?ZWq_Zw2017-06-30T16:10:40+02:002017-06-30T16:10:40+02:00
Check out our latest Analysis Reports of Evasive Malware
Windows
Android
Mac
iOS
— Direct link]]>OpenC2http://links.wr0ng.name/?60s_uw2017-06-23T09:30:53+02:002017-06-23T09:30:53+02:00— Direct link]]>Free Automated Malware Analysis Service - powered by VxStream Sandboxhttp://links.wr0ng.name/?mZRL6w2017-06-21T10:02:03+02:002017-06-21T10:02:03+02:00
This free malware analysis service is running VxStream Sandbox v6.70 in the backend. Supporting PE, Office, PDF, APK files and more (e.g. EML). Maximum upload size is 100 MB.
— Direct link]]>AlienVault - Open Threat Exchangehttp://links.wr0ng.name/?BRU23A2017-05-18T10:52:29+02:002017-05-18T10:52:29+02:00
Share and collaborate in developing threat intelligence.
Protect yourself and the community against today’s latest threats.
At the heart of Open Threat Exchange is the pulse, an investigation of an online threat. Pulses describe any type of online threat including malware, fraud campaigns, and even state sponsored hacking.
Pulses are comprised of indicators of compromise (or IoCs), which describe the infrastructure of that threat – including IPs, file hashes, e-mail addresses affiliated with the threat, etc.
— Direct link]]>The No More Ransom Projecthttp://links.wr0ng.name/?tQKQfg2017-05-17T17:43:38+02:002017-05-17T17:43:38+02:00
The “No More Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and two cyber security companies – Kaspersky Lab and Intel Security – with the goal to help victims of ransomware retrieve their encrypted data without having to pay the criminals.
— Direct link]]>Foofus.Net | Foofus.Net Advanced Security Services Forumhttp://links.wr0ng.name/?z6WNog2017-05-16T14:44:03+02:002017-05-16T14:44:03+02:00 — Direct link]]>Free Automated Malware Analysis Service - powered by VxStream Sandboxhttp://links.wr0ng.name/?Y78gyg2017-05-16T12:45:11+02:002017-05-16T12:45:11+02:00 — Direct link]]>Malware Corpus Tracker - Malicious Download Sites - lockyhttp://links.wr0ng.name/?IvqcmA2017-05-16T10:09:48+02:002017-05-16T10:09:48+02:00http://google.com/70.exe?1' (as Teslacrypt did to query connection) or to '//plus.google.com/u/0/115747778649102578052/about' or 'https://twitter.com/linketelin' (as PlugX samples d9af894d51ba61075c7cd329b0be52df, 02a175b81144b8fa22414e9cf281f71c did) then such links can be found in the listings of tracker although I am not saying the sites as such should be blocked.
— Direct link]]>ThreatMiner.org | Data Mining for Threat Intelligencehttp://links.wr0ng.name/?odIPOg2017-05-16T09:59:30+02:002017-05-16T09:59:30+02:00
Threat intelligence and intrusion analysts who regularly perform research into malware and network infrastructure often find the need to rely on mutliple websites that individually holds a small piece of the larger puzzle.
Furthermore, it is often the case where pivoting directly from an open source research report is unavailable and that it is sometimes difficult to remember if an indicator has alredy been reported and/or attributed. All these small but frustrating obstacles distract an analyst from what they do best: analyse.
— Direct link]]>SenderBase - Ciscohttp://links.wr0ng.name/?c1hR-g2017-05-04T17:19:48+02:002017-05-04T17:19:48+02:00— Direct link]]>urlquery.net - Free url scannerhttp://links.wr0ng.name/?JiNR7A2017-05-03T16:30:02+02:002017-05-03T16:30:02+02:00— Direct link]]>http://old.honeynet.org/scans/http://links.wr0ng.name/?cCLBIA2017-05-02T15:52:28+02:002017-05-02T15:52:28+02:00— Direct link]]>theZoo aka Malware DB by ytisfhttp://links.wr0ng.name/?Kbo7gg2017-04-25T10:27:58+02:002017-04-25T10:27:58+02:00
Github: https://github.com/ytisf/theZoo — Direct link]]>IBM X-Force Exchangehttp://links.wr0ng.name/?0zhHig2017-04-14T16:41:28+02:002017-04-14T16:41:28+02:00
Introducing threat feed manager: you can now view external sources of threat intelligence within XFE.
— Direct link]]>Demande de révision de site Webpulse | Bluecoathttp://links.wr0ng.name/?-p3m2A2017-04-13T17:33:01+02:002017-04-13T17:33:01+02:00— Direct link]]>Computer Security Resource Center :: National Vulnerability Database - CWE Over Timehttp://links.wr0ng.name/?IzJQvA2017-04-13T17:03:00+02:002017-04-13T17:03:00+02:00— Direct link]]>Stucco-Datahttp://links.wr0ng.name/?I-z0qQ2017-04-10T13:31:26+02:002017-04-10T13:31:26+02:00— Direct link]]>BroadAnalysis – Threat Intelligence and Malware Researchhttp://links.wr0ng.name/?GcwrIg2017-04-10T10:03:57+02:002017-04-10T10:03:57+02:00
All domains and URLs listed on this website should be considered as dangerous and could cause damage to your computer. We do not provide clickable active hyperlinks to these sites.
Use this website at your own risk!
— Direct link]]>Intrusion Hunting for the Masses David Sharpe - YouTubehttp://links.wr0ng.name/?E49wng2017-04-07T15:13:18+02:002017-04-07T15:13:18+02:00
Hackmiami Conference 2016
— Direct link]]>TinyNuke Explained - part II - YouTubehttp://links.wr0ng.name/?QpEtdg2017-04-06T14:17:02+02:002017-04-06T14:17:02+02:00— Direct link]]>TinyNuke Explained - part I - YouTubehttp://links.wr0ng.name/?UkNk9Q2017-04-06T14:15:57+02:002017-04-06T14:15:57+02:00— Direct link]]>GitHub - aainz/TinyNuke: zeus-style banking trojanhttp://links.wr0ng.name/?9dY9Jg2017-04-03T15:15:09+02:002017-04-03T15:15:09+02:00
- Formgrabber and Webinjects for Firefox, Internet Explorer and Chrome. Can inject x86 as well as x64 browsers.
- Reverse SOCKS 4
- HVNC like Hidden Desktop
- Trusteer Bypass
- ~32kb binary with obfuscated strings ~20kb without
— Direct link]]>Ransomware Trackerhttp://links.wr0ng.name/?qDfolQ2017-02-17T16:05:00+01:002017-02-17T16:05:00+01:00
Ransomware Tracker provides a short guideline for both home users and enterprises on how to avoid becoming a victim of Ransomware.
Ransomware Tracker offers various blocklists. These blocklists allows enterprises to block malicious traffic towards known Ransomware infrastructure at the network edge, e.g. by blocking them on the corporate firewall, web proxy or in the local DNS server.
— Direct link]]>Trustworthy Internet Movementhttp://links.wr0ng.name/?oLhteQ2017-02-01T17:46:18+01:002017-02-01T17:46:18+01:00
TIM, the Trustworthy Internet Movement is a non-profit, vendor-neutral organization leveraging the power of the global security community to advance industry-wide technology innovations and initiatives for actionable change.
— Direct link]]>Malwr - Malware Analysis by Cuckoo Sandboxhttp://links.wr0ng.name/?lyoLUQ2014-03-10T01:10:19+01:002014-03-10T01:10:19+01:00— Direct link]]>Botnetshttp://links.wr0ng.name/?mG3fsg2014-03-10T01:10:04+01:002014-03-10T01:10:04+01:00— Direct link]]>