Important Note - Interest is terrible thing to waste. Where are you?

\/ w4rri0r \/Hacking is not a crime - It's an art of Awareness. \/ w4rri0r mission \/ is to make the information systems more secure, more aware, more reliable and protect against possible security breaches.

\/ w4rri0r \/ internationally recognized as a Security Researcher or White-Hat Hacker and Hall of Fame by Google, Microsoft, Yahoo, AppleRedHat, AT&T, Adobe, PayPal, Yandex, eBay, Deutsche TelekomBarracuda Networks, Nokia Siemens Network, Tuenti, Opera, BlackBerry, Nokia, SpotifyZynga, Netflix, iFixit, Basecamp, SoundCloudConstant Contact, Xmarks, LaunchKey, Zendesk and we are currently building \/ w4rri0r group \/ and inviting to join worldwide Security Researchers and Professionals. If you think you can contribute anything for \/ w4rri0r group \/ you are heartily invited and we'll give credit for your contribution and is greatly appreciated. [Launching soon]

If you have any questions, ideas, suggestions or contributions please do not hesitate to contact @ This email address is being protected from spambots. You need JavaScript enabled to view it. and will respond you within 24 hours.

Open Panel
  • Register

Malicious Code Analysis

Malicious Code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious Code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Malicious Code describes a broad category of system security terms that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content.

Malicious Code can take the form of:

  • Java Applets
  • ActiveX Controls
  • Scripting languages
  • Browser plug-ins
  • Pushed content


Once inside your environment Malicious Code can enter network drives and propagate. Malicious Code can also cause network and mail server overload by sending email messages, stealing data and passwords, deleting document files, email files or passwords, and even re-formatting hard drives.


MALICIOUS CODE- SOFTWARE'S / TOOLS / UTILITIES

  1. Frameworks
  2. Malware Analysis
  3. Online Malware Analysis
  4. Online Identify Malicious Websites
  5. PDF Files
  6. Public Blocklists of Suspected Malicious IPs and URLs
  7. Sandboxes
  8. Website Malware Detection
  9. Shellcode Analysis



FRAMEWORKS

  • Malheur
  • Minibis
  • ReFrameworker
  • Yara
  • ZeroWine



MALWARE ANALYSIS

  • Malware Classifier
  • androguard
  • pyew
  • jsunpack-n
  • Rootkit Profiler LX
  • Exefilter
  • Cuckoo Sandbox
  • Capture BAT



ONLINE MALWARE ANALYSIS

  • Anubis
  • BitBlaze Malware Analysis Service
  • Comodo Automated Analysis System
  • CWSandbox
  • EUREKA Malware Analysis Internet Service
  • Joebox
  • Norman SandBox
  • ThreatExpert
  • VirusTotal
  • Xandora



ONLINE IDENTIFY MALICIOUS WEBSITES

  • AVG Online Web Page Scanner
  • Finjan URL Analysis
  • Knownsec
  • Malware Domain List
  • McAfee Site Advisor
  • McAfee Trusted Source
  • Norton Safe Web
  • ParetoLogic URL Clearing House
  • PhishTank
  • Secure Browsing Protection
  • TrendMicro Web Repuation
  • Unmask Parasites
  • URL Blacklist
  • vURL
  • Webawet
  • Web of Trust



PDF FILES

  • Jsunpack
  • Origami
  • PDFResurrect
  • PDFStreamDumper
  • Opaf
  • Origapy
  • pyPDF
  • PDFMiner
  • PDF Examiner



PUBLIC BLOCKLISTS OF SUSPECTED MALICIOUS IPS AND URLS

  • BLADE Malicious URL Analysis
  • CYMRU Bogon List
  • DShield Blocklist
  • DShield Highly Predictive Blacklist
  • EmergingThreats Lists
  • hpHosts File
  • Malware Domain Blocklist
  • MalwareDomainList.com Hosts List
  • Malware Patrol's Malware Block Lists
  • MalwareURL List
  • PhishTank Phish Archive
  • Project Honey Pot's Directory of Malicious IPs
  • Shadowserver IP and URL Reports
  • Sucuri Blacklists
  • ZeuS Tracker Blocklist



SANDBOXES

  • Sydbox



WEBSITE MALWARE DETECTION

  • iScanner



SHELLCODE ANALYSIS

  • libemu
  • Shellcode2Exe
  • scdbg (libemu - emulation)
  • sclog (iDefense - runs live)
  • Hook Analyser Malware

w4rri0r.com - Main Menu

h4x0r

Vulnerabilities

Exploits

Advisories

Training

Swords

CORE Impact Professional

Logo Core ImpactCORE Impact Professional is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization.

 
 

Read More...

IBM Security AppScan

Logo IBM Rational AppScanIBM Rational AppScan Enterprise is a scalable solution to help resolve application security vulnerabilities, offering recommendations to simplify remediation.

 

Read More...

HP WebInspect

Logo - HP WebInspectHP WebInspect gives security professionals and security novices alike the power and knowledge to quickly identify and validate critical, high-risk security vulnerabilities.

 

Read More...

Acunetix WVS

logo acunetix web application securityAcunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits web applications by checking for hacking vulnerabilities. 

 

Read More...

w4rri0r - Hacking Is Not A Crime - It's an art of Awareness

\/ w4rri0r - Hacking Is Not A Crime - It's an art of Awareness \/ -  w4rri0r work in the dark, w4rri0r do what w4rri0r can, w4rri0r give what w4rri0r have, w4rri0r doubt is w4rri0r passion and w4rri0r passion is w4rri0r task. The rest is the madness of art \/ w4rri0r \/ 

\/ w4rri0r.com \/ are the great resource for information security professionals and researcher. \/ w4rri0r \/ offers a extensive variation of information security services that include SECURITY EXPLOITS (Bug or Vulnerability), SECURITY ADVISORIES (Security Alerts), SECURITY RESEARCHER TOOLBOX (Freeware, Shareware & Open-Source), SHELLCODE (Attacker Controller - Chunk of Data), SECURITY TRAINING (Educational Purpose), SECURITY NEWS (Security Recent or Important Events) and with this group you can be assured that you’re in the right hands. \/ w4rri0r gr0up \/  efforts being endorsed and appreciated by administrators, security researchers and members of various underground hacking groups and communities worldwide.

\/ w4rri0r mission \/ are to make the information systems more secure, more aware, more reliable and protect against possible security breaches.