asteroza + antivirus   124

[Python] exploit.py - Pastebin.com
ClamAV exploit. This will not end well, considering this is used in a bunch of "security" gateways and servers as a first line of defense (as a general filter)...
ClamAV  antivirus  exploit  security  hacking  pentestng 
9 days ago by asteroza
Configure and validate Windows Defender Antivirus network connections | Microsoft Docs
Rough list of Windows Defender antivirus update endpoints. But, apparently there is also a secret set of URI's that get used only if updates have failed for more than 14 days that are undocumented, as a way for MS to bypass corporate blocks in an attempt to improve general internet health...
windows  defender  antivirus  update  endpoint  URL  list  proxy  bypass  sysadmin  reference  information  tips  tricks 
4 weeks ago by asteroza
OPSWAT File Security for Chrome - Chrome Web Store
For those who don't want to just use VirusTotal, but, um , Google owns VirusTotal so...
chrome  browser  addon  plugin  extension  security  download  file  hash  scanning  antivirus  URL  reputation  cloud 
july 2019 by asteroza
Windows Defender Antivirus can now run in a sandbox - Microsoft Secure
Tavis Ormandy and TrailofBits bullying Windows Defender finally resulted in something useful, WD in a proper sandbox.
Microsoft  Windows  Defender  antivirus  sandbox  security 
october 2018 by asteroza
hegusung/AVSignSeek: Tool written in python3 to determine where the AV signature is located in a binary/payload
Tool to sniff out exactly where in a zip file antivirus is pattern matching, which can be useful to do some bit twiddling to evade detection
antivirus  signature  range  detection  script  python  security  hacking  pentesting 
may 2018 by asteroza
AppGuard
Claim to stop 100% of attacks, which by definition is snake oil...
windows  antivirus  security  software  japan 
september 2017 by asteroza
Immunet AntiVirus
interesting cloud antivirus service thingy...
cloud  antivirus  service  security 
september 2017 by asteroza
fireeye/rvmi: rVMI - A New Paradigm For Full System Analysis
FireEye dumped a hypervisor level debugger to explore malware on isolated VM's with no guest internal debugger that would otherwise trigger malware hibernation
security  research  software  hypervisor  VM  debugger  antimalware  antivirus 
september 2017 by asteroza
Windows Defender Antivirus cloud protection service: Advanced real-time defense against never-before-seen malware – Windows Security
Microsoft upping their EDR (Endpoint Detection and Response) gameby making their antivirus suck less, probably fusing/extending their Defender APT work
Microsoft  antivirus  defender  windows  10  security  realtime  cloud  sandbox 
july 2017 by asteroza
CryptoPrevent Malware Prevention – Foolish IT
Not perfect, but a reasonable last line of defense for ransomware like CryptoLocker
ransomware  malware  protection  defense  software  antivirus  security  Delicious 
may 2016 by asteroza
OSVDB: Open Sourced Vulnerability Database
At first glance appears to be non-commercial, but it looks more a for-profit hiding behind a non-profit
infosec  opensource  vulnerability  database  security  hacking  exploit  archive  information  virus  antivirus  malware  Delicious 
may 2014 by asteroza
SARDU - Multi Boot USB pendrive and CD or DVD Builder
Shardana Antivirus Rescue Disk Utility, a handy little tool for creating LiveCD/LiveDVD/bootable USB images that contain multiple individual LiveCD's, so you can carry multiple recovery and installation tool in one device.
liveCD  SARDU  multiboot  boot  image  builder  software  liveDVD  USB  install  installation  ISO  virus  malware  rootkit  removal  utilities  tips  tricks  sysadmin  antivirus  portable  rescue  linux  windows  tools  freeware  Delicious 
december 2011 by asteroza
Microsoft Safety Scanner - Antivirus | Remove Spyware, Malware, Viruses Free
Interesting that this is only good for 10 days, in an effort to force you to download the latest updates. I wonder what i the difference between this and MRT, and the Strider research?
microsoft  security  scanner  rootkit  malware  antivirus  virus  removal  software  tool  utilities  sysadmin  Delicious 
december 2011 by asteroza
What is Windows Defender Offline?
Windows Defender Offline seems to be the official microsoft liveCD for rootkit/virus removal
antimalware  virus  windows  security  sysadmin  offline  rootkit  antivirus  removal  software  tools  utilities  liveCD  defender  malware  Delicious 
december 2011 by asteroza
[FFR] 株式会社フォティーンフォティ技術研究所
Interesting "signatureless" antivirus HIPS for windows desktops, developed within Japan around 2009 or so.
yarai  antivirus  software  windows  security  HIDS  HIPS  IDP  japan  Delicious 
november 2011 by asteroza
http://www.mvps.org/winhelp2002/hosts.txt
Apparently a decent hosts file to protect you from the less reputable parts of the intarwebs...
hosts  file  antivirus  antimalware  antispyware  antiadware  security  privacy  protection  localhost  redirect  Delicious 
november 2010 by asteroza
« earlier      
per page:    204080120160

related tags

2.0  8.5i  5958.dat  acceleration  accelerator  access  accesspoint  ad  addon  AI  AIM  AIMpro  algorithm  amavisd-new  AMSS  analysis  analyzer  android  anonymizer  antiad  antiadware  antikeylogger  antimalware  antiphishing  antiransomware  antispam  antispyware  antitracker  antitracking  antivirus  AP  APK  app  appliance  application  AppRemover  archive  archiving  articles  ASIC  asset  attack  auditing  AV  avast  avast!  avira  AWS  bad  Barracuda  based  beta  bitdefender  blacklist  block  blocker  blocking  book  boot  box  bridge  browser  bucket  builder  business  bypass  C-300  cache  captive  CD  cheatsheet  check  checker  chrome  Citrix  clamAV  ClamAV  ClamAVlib  clean  cleanup  clearinghouse  cloud  CMX  code  collaboration  ComboFix  ComboFIx  company  comparison  competition  compliance  compression  configuration  consumer  content  control  copy  corporate  cryptolocker  cryptoprevent  cuckoo  D-Link  DAT  database  debugger  decrypter  decryption  defender  defense  Delicious  detection  device  devices  disk  DLL  dongle  download  drive  dynamic  egress  electronics  email  embedded  emergency  emerging  emulator  encapsulation  encrypted  encryption  Endian  endpoint  enforcement  engine  engineering  english  enterprise  environment  essential  essentials  ethernet  evasion  event  exchange  exfiltration  experimental  exploit  expresscard  extension  external  factor  false  fight  file  filter  filterbit  filtering  firewall  flash  floppy  form  format  Fortinet  framework  free  freeware  fusion  fusionsystems  fuzzed  fuzzing  gatekeeper  gateway  GENOME  guide  hacking  hackng  handsfree  hardware  hash  HAVP  HIDS  highly  HiJackThis  HIPS  home  host  hosted  hosting  hosts  howto  HPB  http  hypervisor  ICA  IDP  IDS  IEEE  IIS  IM  image  infection  information  infosec  infromation  injection  inline  Innominate  install  installation  instant  integrated  integration  intrusion  Intune  invalid  iPhantom  IPS  IPSEC  ISA  ISO  ISO-G  IT  japan  kali  kaspersky  key  kit  law  legal  library  linux  list  live  liveCD  LiveCD  liveDVD  localhost  logging  lookout  mac  macro  MacScan  mad  mail  malware  management  manual  MBR  McAfee  medium  memory  message  messaging  metadata  metascan  metasploit  meterpreter  mGuard  Micro  microsoft  mobile  monitoring  MRT  MSE  MSRT  MTA  multiboot  mutator  network  NOD32  NodalCore  Norton  obfuscation  office  offline  OIB  omnipod  ondemand  online  opensource  OPSWAT  OSX  Outlook  outsourced  p2p  package  password  patch  patent  payload  PCIexpress  PE  penetration  pentest  pentesting  pentestng  persistent  personal  PHP  plugin  PoC  policy  polymorphic  popup  port  portable  portal  positive  potentially  predictive  prevention  print  privacy  process  productivity  program  proof-of-concept  protable  protection  PROTOS  proxy  python  range  ransom  ransomware  realtime  recon  recovery  redirect  reduction  reference  registry  relay  removal  repair  reputation  rescue  research  restricted  reverse  review  RKill  rootkit  router  routing  rpm  RSA  rule  S3  sample  sandbox  SARDU  scan  scanner  scanning  script  secure  Securespot  SecurID  security  server  service  setting  settings  sharing  shellcode  shootout  sideload  signature  site  small  SME  SMTP  SoC  software  SOHO  solution  spamcube  specific  spyware  squid  ssadmin  SSL  standalone  stateful  stinger  Stingray  storage  subscription  suite  support  surface  svchost  svchost.exe  Symantec  sysadmin  system  systems  TDSSKiller  template  tester  testing  threat  ticks  tips  tool  tools  trend  TrendMicro  tricks  trinity  TRK  trojan  tutorial  U3  unicorn  uninstall  uninstaller  untangle  unwanted  update  upload  URL  USB  user  utilities  UTM  vault  VBA  virus  virusScan  VM  VPN  VPNfilter  vulnerability  web  WebEx  windows  wireless  worm  YARA  yarai  yoggie 

Copy this bookmark:



description:


tags: