Wednesday, 20 May 2020

perPage: 7,


I get emails from readers asking for specific malware samples and thought I would make a mini post about it.

Yes, I often obtain samples from various sources for my own research.

 I am sometimes too lazy/busy to post them but don't mind sharing.
If you are looking for a particular sample, feel free to ask. I might have it.

Send MD5 (several or few samples). I cannot provide hundreds/thousands of samples or any kind of feeds. If you ask for a particular family, I might be able to help if I already have it.

Unfortunately, I do not have time to do homework for students and provide very specific sets for malware with specific features as well as guarantee the C2s are still active.  Send your MD5(s) or at least malware family and I check if I have it :) If i have it, I will either send you or will post on the blog where you can download.

If you emailed me in the past and never got an answer, please remind me. Sometimes emails are long with many questions and I flag them to reply to later, when I have time and they get buried or I forget. It does not happen very often but accept my apologies if it happened to you.

Before you ask, check if it is already available via Contagio or Contagio Mobile.
1. Search the blog using the search box on the right side
2. Search here https://www.mediafire.com/folder/b8xxm22zrrqm4/BADINFECT
3. Search here https://www.mediafire.com/folder/c2az029ch6cke/TRAFFIC_PATTERNS_COLLECTION
4. Search here https://www.mediafire.com/folder/78npy8h7h0g9y/MOBILEMALWARE

Cheers,  Mila

Related links

  1. Hacking Tutorials
  2. Hacker Definicion Informatica
  3. Curso Hacker
  4. Hacking 101

Related Posts:

  • Hackerhubb.blogspot.comHackerhubb.blogspot.comRelated articles Underground Hacker Sites Hacker Tools For Windows Hacking Tools For Mac Hacker Hardware Tools How To Hack Computer Hacker Pentest Tools Linux Pentest Tools For Mac Hacker Tools … Read More
  • Linux Command Line Hackery Series - Part 5 Welcome back to the Linux Command Line Hackery series, this is Part-V of the series. Today we are going to learn how to monitor and control processes on our Linux box, so wrap your sleeves up and let's get started. Comman… Read More
  • Hackerhubb.blogspot.comHackerhubb.blogspot.comRelated posts Pentest Tools Website Vulnerability Hacks And Tools Hacking Tools Windows Hack Tools For Windows Hack Tools 2019 Hack Tools Mac Nsa Hack Tools Wifi Hacker Tools For Windows Hack To… Read More
  • How To Start PHP And MYSQL | The Best Server For PHP And MYSQL | Tutorial 1 Many of people want to start PHP programming embedded with MYSQL databases concepts. So i thought that I should start a series about PHP and MYSQL. So in this series of video tutorials you exactly got the content about PHP… Read More
  • Top 15 Best Operating System Professional Hackers Use Top 15 Best Operating System Professional Hackers Use Top 15 Best Operating System Professional Hackers Use A hacker is someone who seeks and exploits the weaknesses of a computer system or network computing. Hackers m… Read More

0 comments:

Post a Comment

Blog Archive

GET THE LOVE OF YOUR LIFE

Popular Posts

Recent Posts