iteamdevelopers
iteamdevelopers
Sharing Information
13 posts
You'll get information regarding malware analysis & security around the globe.
Don't wanna be here? Send us removal request.
iteamdevelopers · 10 years ago
Link
Security Tools
0 notes
iteamdevelopers · 10 years ago
Link
On the Internet you can find a lot of resources, calling themselves “antivirus” security monitoring services or the site, but only a few are really effective. The same applies to the services of analysis scripts for malicious code, tools for deciphering “Harmful”, and services for the removal of the infected sites of virus databases. #MalwareAnalysis #SiteAnalysis #WebsiteSafety
0 notes
iteamdevelopers · 10 years ago
Link
http://iteamdevelopers.org/add-cuckoo-sandbox-to-ubuntu-as-service/
0 notes
iteamdevelopers · 10 years ago
Link
Cuckoo Sandbox – a system for automatic malware research, exploits, malicious scripts, documents, archives, and links. The system is able to check the documents pdf, doc, xls, rtf, scripts Python, JS, DLL libraries, binaries, jar, and more.
0 notes
iteamdevelopers · 10 years ago
Link
malcontrol is a malware analysis Web site from the open data received to control the “Malware Control Monitor” referred to the project.
0 notes
iteamdevelopers · 10 years ago
Link
As you can see from the subtitle of “Find the name of the evil” is the tool you use to figure the statistics based on the malware name.
0 notes
iteamdevelopers · 10 years ago
Text
Maltego - Enriching your Malware analysis reports with Open Source Intelligence (OSINT)
Maltego – Enriching your Malware analysis reports with Open Source Intelligence (OSINT)
Malformity is a collection of Maltego transforms to assist with malware and malicious infrastructure research. Malformity queries data from many sources (Ex. VirusTotal, Bit9, ThreatExpert…) in order to perform Maltego transforms.
(more…)
View On WordPress
0 notes
iteamdevelopers · 10 years ago
Text
MalwaRE - Malware Repository Framework
MalwaRE – Malware Repository Framework
malwaRE is a malware repository website created using PHP Laravel framework, used to manage your own malware zoo. malwaRE was based on the work of Adlice team with some extra features.
Features
Self-hosted solution (PHP/Mysql server needed)
VirusTotal results (option for uploading unknown samples)
Search filters available (vendor, filename, hash, tag)
Vendor name is picked from VirusTotal results…
View On WordPress
0 notes
iteamdevelopers · 10 years ago
Text
Grinder - System to Automate the Fuzzing of Web Browsers
Grinder – System to Automate the Fuzzing of Web Browsers
Grinder is a system to automate the fuzzing of web browsers and the management of a large number of crashes. Grinder Nodes provide an automated way to fuzz a browser, and generate useful crash information (such as call stacks with symbol information as well as logging information which can be used to generate reproducible test cases at a later stage). A Grinder Server provides a central location…
View On WordPress
0 notes
iteamdevelopers · 10 years ago
Text
HoneyDrive3 on Hyper-V
Having a Honeypot in your network can help to alert you to malicious traffic. However, installing and maintaining one can be a bit troublesome, particularly if you haven’t done it before. The complexity only increases if you aren’t familiar with Linux operating systems. I have written a previous blog on the results I received from a Honeypot I set up on my home network which was accessible to the…
View On WordPress
0 notes
iteamdevelopers · 10 years ago
Text
HoneyDrive Premier Honeypot Linux Distro
HoneyDrive Premier Honeypot Linux Distro #iTeamDevelopers
HoneyDrive is the premier honeypot Linux distro. It is a virtual appliance (OVA) with Xubuntu Desktop 12.04.4 LTS edition installed. It contains over 10 pre-installed and pre-configured honeypot software packages such as Kippo SSH honeypot, Dionaea and Amun malware honeypots, Honeyd low-interaction honeypot, Glastopf web honeypot and Wordpot, Conpot SCADA/ICS honeypot, Thug and PhoneyC…
View On WordPress
0 notes
iteamdevelopers · 10 years ago
Text
Thug-Vagrant
Thug-Vagrant provides a Vagrant configuration file (Vagrantfile) and shell script to automate the setup of a Thug honeyclient in a virtual machine. The need for this project comes from the lengthy and somewhat difficult installation procedure of Thug which can be discouraging. (more…)
View On WordPress
0 notes
iteamdevelopers · 10 years ago
Text
FakeNet Simulates a Network
FakeNet Simulates a Network
FakeNet is a tool that aids in the dynamic analysis of malicious software.  The tool simulates a network so that malware interacting with a remote host continues to run allowing the analyst to observe the malware’s network activity from within a safe environment.  The goal of the project is to:
Be easy to install and use; the tool runs on Windows and requires no 3rd party libraries
Support the…
View On WordPress
0 notes