v x

Invisible Text. Fuck you.

Home Archive Code Zines Windows Papers Linux Papers AV Tech Papers Other Papers Threat Intel Malware Samples APT Collection

Jim Browning: Spying on the Scammers

Youtube: Jim Browning Youtube
Twitter: Official Twitter account
Spying on the Scammer series: YouTube playlist
Download (mirror): Spying on the Scammers complete series

Symantec Archive

32-Bit Virus Threats on 64-Bit Windows
IME as a Possible Keylogger
Have I Got News for you: Analysis of Flamer C&C Server
Analysis of malware targeting the Boleto payment system
An Analysis of the Slapper Worm Exploit
Analysis of the Windows Vista Security Model
Android.Opfake In-Depth
The Apple threat landscape
Assessment of Windows Vista Kernel-Mode Security
Assets, Threats and Vulnerabilities: Discovery and Analysis
Attacks on point-of-sales systems
Attacks on Virtual Machine Emulators
ATTACKS ON WIN32 – PART II
The Black Vine cyberespionage group
Symantec Brightmail™ Anti Phishing
The continued rise of DDoS attacks
Crisis: The Advanced Malware
Cyberterrorism?
Cyberterrorism and the Home User
The Digital Immune System
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Drive-By Pharming
The Economics of Information Warfare - Poking Layered Security with a Stick
The Elderwood Project
The evolution of the fileless click-fraud malware Poweliks
Evolving ShellCode
Financial threats 2015
Hidden Lynx – Professional Hackers for Hire
How safe is your quantified self?
Hunting For Metamorphic
IM_a nuisance – W32.Imav.A
THE INCREASED USE OF POWERSHELL IN ATTACKS
Insecurity in the Internet of Things
ISTR Cryptojacking: A Modern Cash Cow
Learn More About Viruses and Worms
The Luckycat Hackers
Malicious Threats to Personal Digital Assistants
Malicious Threats and Vulnerabilities in Instant Messaging
Malicious Yahooligans
Malicious Threats of Peer-to-Peer Networking
Managing Security Incidents in the Enterprise
Me code write good: The l33t skillz of the virus writer.
MEMORY SCANNING UNDER WINDOWS NT
Microsoft Office 2000 and Security Against Macro Viruses
Mistakes in the IaaS cloud could put your data at risk
Mobile Adware and Malware Analysis
Motivations of Recent Android Malware
Responding to the Nimda worm: Recommendations for addressing blended threats
NTFS Streams
Palm Breach
The Panda Outlaw: W32.Fujacks
Peerbot: Catch me if you can
Phishing Attacks In and Around April through September 2006
“Phishing In The Middle Of The Stream” - Today’s Threats To Online Banking
Potential Threats to WAP Enabled Devices
Ransomware and Businesses 2016
Ransomware: A Growing Menace
Regin: Top-tier espionage tool enables stealthy surveillance
Regional Threats
Rootkits
Sality: Story of a Peerto-Peer Viral Network
Scams and Spam to Avoid on Facebook
Script-Based Mobile Threats
Stealing Virtual Assets from a Digital World
Stories From The DRM World: The Settec Case
Striking Similarites: Win32/Simile and Metamorphic Virus Code
Stuxnet 0.5: The Missing Link
Targeted Attacks Against the Energy Sector
Techniques of Adware and Spyware
The Teredo Protocol: Tunneling Past Network Security and Other Security Implications
A Testing Methodology for Rootkit Removal Effectiveness
The evolution of ransomware
The Nitro Attacks: Stealing Secrets from the Chemical Industry
Threats to Online Banking
Threats to virtual environments
Trojan.Bamital
Trojan.Neloweg: Bank Robbing Bot in the Browser
Trojan.Taidoor: Targeting Think Tanks
Uncovering a persistent diet spam operation on Twitter
Understanding and Managing Polymorphic Viruses
Understanding Symantec’s Anti-virus Strategy for Internet Gateways
Understanding Heuristics: Symantec’s Bloodhound Technology
Understanding Virus Behavior in 32-bit Operating Environments
Understanding Virus Behavior under Windows NT
Virus and Vulnerability Classification Schemes: Standards and Integration
W32.Changeup: How the Worm Was Created
W32.Duqu: The precursor to the next Stuxnet
W32.Qakbot in Detail
W32.Xpaj.B: Making Easy Money from Complex Code
The Waterbug attack group
Web Based Attacks
What next? Trojan.Linkoptimizer
What’s in a Name?
When Malware Meets Rootkits
Windows Rootkit Overview
Windows 8 Security
Wireless LAN Security
The World of Financial Trojans
ZeroAccess Indepth
Windows Vista Network Attack Surface Analysis
W32.Ramnit analysis
Trojan.ZeroAccess: Infection Analysis
Inside the Windows Meta File Format

Virus Bulletin Archives

Virus Bulletin
1989 July, 1989
Table of Contents
August, 1989
Table of Contents
September, 1989
Table of Contents
October, 1989
Table of Contents
November, 1989
Table of Contents
December, 1989
Table of Contents
1990 January, 1990
Table of Contents
February, 1990
Table of Contents
March, 1990
Table of Contents
April, 1990
Table of Contents
May, 1990
Table of Contents
June, 1990
Table of Contents
July, 1990
Table of Contents
August, 1990
Table of Contents
September, 1990
Table of Contents
October, 1990
Table of Contents
November, 1990
Table of Contents
December, 1990
Table of Contents
1991 January, 1991
Table of Contents
February, 1991
Table of Contents
March, 1991
Table of Contents
April, 1991
Table of Contents
May, 1991
Table of Contents
June, 1991
Table of Contents
July, 1991
Table of Contents
August, 1991
Table of Contents
September, 1991
Table of Contents
October, 1991
Table of Contents
November, 1991
Table of Contents
December, 1991
Table of Contents
1992 January, 1992
Table of Contents
February, 1992
Table of Contents
March, 1992
Table of Contents
April, 1992
Table of Contents
May, 1992
Table of Contents
June, 1992
Table of Contents
July, 1992
Table of Contents
August, 1992
Table of Contents
September, 1992
Table of Contents
October, 1992
Table of Contents
November, 1992
Table of Contents
December, 1992
Table of Contents
1993 January, 1993
Table of Contents
February, 1993
Table of Contents
March, 1993
Table of Contents
April, 1993
Table of Contents
May, 1993
Table of Contents
June, 1993
Table of Contents
July, 1993
Table of Contents
August, 1993
Table of Contents
September, 1993
Table of Contents
October, 1993
Table of Contents
November, 1993
Table of Contents
December, 1993
Table of Contents
1994 January, 1994
Table of Contents
February, 1994
Table of Contents
March, 1994
Table of Contents
April, 1994
Table of Contents
May, 1994
Table of Contents
June, 1994
Table of Contents
July, 1994
Table of Contents
August, 1994
Table of Contents
September, 1994
Table of Contents
October, 1994
Table of Contents
November, 1994
Table of Contents
December, 1994
Table of Contents
1995 January, 1995
Table of Contents
February, 1995
Table of Contents
March, 1995
Table of Contents
April, 1995
Table of Contents
May, 1995
Table of Contents
June, 1995
Table of Contents
July, 1995
Table of Contents
August, 1995
Table of Contents
September, 1995
Table of Contents
October, 1995
Table of Contents
November, 1995
Table of Contents
December, 1995
Table of Contents
1996 January, 1996
Table of Contents
February, 1996
Table of Contents
March, 1996
Table of Contents
April, 1996
Table of Contents
May, 1996
Table of Contents
June, 1996
Table of Contents
July, 1996
Table of Contents
August, 1996
Table of Contents
September, 1996
Table of Contents
October, 1996
Table of Contents
November, 1996
Table of Contents
December, 1996
Table of Contents
1997 January, 1997
Table of Contents
February, 1997
Table of Contents
March, 1997
Table of Contents
April, 1997
Table of Contents
May, 1997
Table of Contents
June, 1997
Table of Contents
July, 1997
Table of Contents
August, 1997
Table of Contents
September, 1997
Table of Contents
October, 1997
Table of Contents
November, 1997
Table of Contents
December, 1997
Table of Contents
1998 January, 1998
Table of Contents
February, 1998
Table of Contents
March, 1998
Table of Contents
April, 1998
Table of Contents
May, 1998
Table of Contents
June, 1998
Table of Contents
July, 1998
Table of Contents
August, 1998
Table of Contents
September, 1998
Table of Contents
October, 1998
Table of Contents
November, 1998
Table of Contents
December, 1998
Table of Contents
1999 January, 1999
Table of Contents
February, 1999
Table of Contents
March, 1999
Table of Contents
April, 1999
Table of Contents
May, 1999
Table of Contents
June, 1999
Table of Contents
July, 1999
Table of Contents
August, 1999
Table of Contents
September, 1999
Table of Contents
October, 1999
Table of Contents
November, 1999
Table of Contents
December, 1999
Table of Contents
2000 January, 2000
Table of Contents
February, 2000
Table of Contents
March, 2000
Table of Contents
April, 2000
Table of Contents
May, 2000
Table of Contents
June, 2000
Table of Contents
July, 2000
Table of Contents
August, 2000
Table of Contents
September, 2000
Table of Contents
October, 2000
Table of Contents
November, 2000
Table of Contents
December, 2000
Table of Contents
2001 January, 2001
Table of Contents
February, 2001
Table of Contents
March, 2001
Table of Contents
April, 2001
Table of Contents
May, 2001
Table of Contents
June, 2001
Table of Contents
July, 2001
Table of Contents
August, 2001
Table of Contents
September, 2001
Table of Contents
October, 2001
Table of Contents
November, 2001
Table of Contents
December, 2001
Table of Contents
2002 January, 2002
Table of Contents
February, 2002
Table of Contents
March, 2002
Table of Contents
April, 2002
Table of Contents
May, 2002
Table of Contents
June, 2002
Table of Contents
July, 2002
Table of Contents
August, 2002
Table of Contents
September, 2002
Table of Contents
October, 2002
Table of Contents
November, 2002
Table of Contents
December, 2002
Table of Contents
2003 January, 2003
Table of Contents
February, 2003
Table of Contents
March, 2003
Table of Contents
April, 2003
Table of Contents
May, 2003
Table of Contents
June, 2003
Table of Contents
July, 2003
Table of Contents
August, 2003
Table of Contents
September, 2003
Table of Contents
October, 2003
Table of Contents
November, 2003
Table of Contents
December, 2003
Table of Contents
2004 January, 2004
Table of Contents
February, 2004
Table of Contents
March, 2004
Table of Contents
April, 2004
Table of Contents
May, 2004
Table of Contents
June, 2004
Table of Contents
July, 2004
Table of Contents
August, 2004
Table of Contents
September, 2004
Table of Contents
October, 2004
Table of Contents
November, 2004
Table of Contents
December, 2004
Table of Contents
2005 January, 2005
Table of Contents
February, 2005
Table of Contents
March, 2005
Table of Contents
April, 2005
Table of Contents
May, 2005
Table of Contents
June, 2005
Table of Contents
July, 2005
Table of Contents
August, 2005
Table of Contents
September, 2005
Table of Contents
October, 2005
Table of Contents
November, 2005
Table of Contents
December, 2005
Table of Contents
2006 January, 2006
Table of Contents
February, 2006
Table of Contents
March, 2006
Table of Contents
April, 2006
Table of Contents
May, 2006
Table of Contents
June, 2006
Table of Contents
July, 2006
Table of Contents
August, 2006
Table of Contents
September, 2006
Table of Contents
October, 2006
Table of Contents
November, 2006
Table of Contents
December, 2006
Table of Contents
2007 January, 2007
Table of Contents
February, 2007
Table of Contents
March, 2007
Table of Contents
April, 2007
Table of Contents
May, 2007
Table of Contents
June, 2007
Table of Contents
July, 2007
Table of Contents
August, 2007
Table of Contents
September, 2007
Table of Contents
October, 2007
Table of Contents
November, 2007
Table of Contents
December, 2007
Table of Contents
2008 January, 2008
Table of Contents
February, 2008
Table of Contents
March, 2008
Table of Contents
April, 2008
Table of Contents
May, 2008
Table of Contents
June, 2008
Table of Contents
July, 2008
Table of Contents
August, 2008
Table of Contents
September, 2008
Table of Contents
October, 2008
Table of Contents
November, 2008
Table of Contents
December, 2008
Table of Contents
2009 January, 2009
Table of Contents
February, 2009
Table of Contents
March, 2009
Table of Contents
April, 2009
Table of Contents
May, 2009
Table of Contents
June, 2009
Table of Contents
July, 2009
Table of Contents
August, 2009
Table of Contents
September, 2009
Table of Contents
October, 2009
Table of Contents
November, 2009
Table of Contents
December, 2009
Table of Contents
2010 January, 2010
Table of Contents
February, 2010
Table of Contents
March, 2010
Table of Contents
April, 2010
Table of Contents
May, 2010
Table of Contents
June, 2010
Table of Contents
July, 2010
Table of Contents
August, 2010
Table of Contents
September, 2010
Table of Contents
October, 2010
Table of Contents
November, 2010
Table of Contents
December, 2010
Table of Contents
2011 January, 2011
Table of Contents
February, 2011
Table of Contents
March, 2011
Table of Contents
April, 2011
Table of Contents
May, 2011
Table of Contents
June, 2011
Table of Contents
July, 2011
Table of Contents
August, 2011
Table of Contents
September, 2011
Table of Contents
October, 2011
Table of Contents
November, 2011
Table of Contents
December, 2011
Table of Contents
2012 January, 2012
Table of Contents
February, 2012
Table of Contents
March, 2012
Table of Contents
April, 2012
Table of Contents
May, 2012
Table of Contents
June, 2012
Table of Contents
July, 2012
Table of Contents
August, 2012
Table of Contents
September, 2012
Table of Contents
October, 2012
Table of Contents
November, 2012
Table of Contents
December, 2012
Table of Contents
2013 January, 2013
Table of Contents
February, 2013
Table of Contents
March, 2013
Table of Contents
April, 2013
Table of Contents
May, 2013
Table of Contents
June, 2013
Table of Contents
July, 2013
Table of Contents
August, 2013
Table of Contents
September, 2013
Table of Contents
October, 2013
Table of Contents
November, 2013
Table of Contents
December, 2013
Table of Contents
2014 January, 2014
Table of Contents
February, 2014
Table of Contents
March, 2014
Table of Contents
April, 2014
Table of Contents
May, 2014
Table of Contents
June, 2014
Table of Contents

Want to sponsor vx-underground?

Your information could go here