Jump to content

Search the Community

Showing results for tags 'Malware'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 7 results

  1. I am not sure if this is the right bored to be talking about this I am willing to code Trojans,Viruses,Bots and any other type of malware in exchange for bitcoins. It could do just about anything you want example: Backdoor a system, Destroy the entire computer, Delete files, Record video and audio, etc pm me if your interested
  2. Is there a finfisher removal tool for LInux?
  3. I was doing a little bit of reading about boot kits. And this stuff is pretty interesting. Any of you guys deal with boot kits at all?
  4. My brother got some ransomware on his phone. I would just encrypt and factory reset a couple of times. But I can't access anything on the phone. Any time I try to open up settings it just pops up this fake FBI thing. I need something like DBAN but for an android phone. The only other device I can see it being able to boot from is the micro sd card. But can this thing network boot. Is there a way to boot android any kind of recovery mode? I don't really phones all that good. Ok so I figured out how to boot into safe mode and factory reset the thing. But hey, are there some other nifty ways of gaining access and wiping? Like say I wanted to install ubuntu phone or kali nethunter. There always seems to be some old phones just taking up space in a drawer around here.
  5. Hi everyone!! Does anyone has any tips and advice on how to get started in this area? Where can I learn more? Thank you very much!!
  6. Evening all, I am a Security Analyst with a number of years under my belt. I have worked for many organisations in quite a few different industries, namely Defence & Aerospace and Telecommunications. During my time working for a Defence & Aerospace company, I was heavily involved in APT investigations, APT group tracking and the field of threat intelligence (OSINT). I recently started a blog, Chimera Security and was wondering, what is the best way to get my brand out there and start generating traffic? I am already working on a few projects and will be posting write-ups of those over the next few weeks. The content on the blog is pretty slow at the minute but the amount of traffic the blog gets will increase the amount of content I create and get out there! Regards, - J _____________________________________________________ http://www.chimera-security.com http://www.twitter.com/ChimeraSecurity
  7. This 3 part article gives a comprehensive description of Windows commandline usage and how the myriad commands may be used to maximise productivity in malwarre and forensic sessions. Part 1 : http://resources.infosecinstitute.com/command-line-for-windows-malware-analysis-forensics-part-i/ Part 2 : http://resources.infosecinstitute.com/commandline-malware-and-forensics/ Part 3 : http://resources.infosecinstitute.com/cmd-exe-loops-part-iii/
×
×
  • Create New...