RSS 6 projects tagged "malware"

Download Website Updated 15 Jun 2009 ClamAV Unofficial Signatures Updater

Screenshot
Pop 35.13
Vit 42.28

ClamAV Unofficial Signatures Updater is a script that provides a simple way to download, test, and use third-party ClamAV signatures. It checks for updated unofficial clamav signature database files and can download them. It randomizes download time to help distribute the load more evenly for the database host mirror sites. Signature bypass entries can be created for temporarily resolving false-positive issues with third-party signatures. It can report which mirror site a download came from. It reports if a downloaded database is actually different than the running copy. Many other features are supported.

No download Website Updated 03 Feb 2011 malmon

Screenshot
Pop 32.22
Vit 1.00

malmon is a realtime backdoor/exploit detection and removal daemon. It uses inotify (pyinotify) to monitor file activity in one or more directories and checks files smaller than a size specified in configuration file. It's appropriate for hosting servers.

Download Website Updated 08 Feb 2011 Bluepot

Screenshot
Pop 48.21
Vit 1.00

Bluepot is a Bluetooth honeypot. It is designed to accept and store any malware sent to it and to interact with common Bluetooth attacks such as “BlueBugging” and “BlueSnarfing”. Bluetooth connectivity is provided via hardware Bluetooth dongles. The system also allows monitoring of attacks via a graphical user interface that provides graphs, lists, a dashboard, and further detailed analysis from log files. The system is also highly configurable through said interface.

Download Website Updated 24 Jan 2012 Bokken

Screenshot
Pop 75.99
Vit 1.90

Bokken is a GUI for the Pyew and Radare2 projects. It provides an interface to almost all the features of Pyew, and many in radare2. It's intended to be a multi-architecture disassembler and binary analysis tool, and maybe some day an alternative for commercial alternatives as IDA Pro. Currently, Bokken is neither a hexadecimal editor nor a full featured disassembler, so it should not be used for deep code analysis or for modifying files.

No download Website Updated 26 Jul 2013 CIRCLean

Screenshot
Pop 32.56
Vit 16.24

CIRCLean aims to be used by someone receiving a USB key from an untrusted source who wants to see the content without opening the original and potentially malicious files. The code runs on a Raspberry Pi, which means it is never required to plug the original USB key into a computer.

No download No website Updated 04 Mar 2014 AntiJOP

Screenshot
Pop 90.71
Vit 1.01

AntiJOP is an anti-malware solution that recodes assembly language to remove JOP attack gadgets. JOP attacks on x86 often hinge on the availability of 0xFF bytes in preexisting code, which can be co-opted to serve as register-indirect call instructions. AntiJOP removes instances of 0xFF bytes that may exist, for example, in immediate values, MOD/RM bytes, etc.

Screenshot

Project Spotlight

Polipo

A lightweight caching Web proxy.

Screenshot

Project Spotlight

MailSteward

A way to archive and access your email with the power of a relational database.