Aggregated AbuseIPDB blocklists with worst IPv4 & IPv6 offenders (~100% confidence)
-
Updated
Jun 6, 2024 - Shell
Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, and more. Its primary goal is to compromise the integrity, confidentiality, or availability of information, often for financial gain, espionage, or other malicious purposes.
Aggregated AbuseIPDB blocklists with worst IPv4 & IPv6 offenders (~100% confidence)
Hidden VNC constitutes an ingenious stratagem harnessed by the most adept connoisseurs of technology. This method, by far, presents an exhilarating modality to govern the operation
The X-Worm Rat Hvnc stands as a pinnacle of remote administration tools, complemented by its advanced Hvnc capabilities.
Remote Administration Either you are a private user wanting to control your PC from afar, or a big company which wants to administrate hundreds of machines from a single computer,
Cron caching of https://iplists.firehol.org (without private networks a.k.a RFC1918)
The S-500 G2 Rat Hvnc stands as a pinnacle of remote administration tools, complemented by its advanced Hvnc capabilities.
The RunPE program is written in C# to execute a specific executable file within another file's memory using the ProcessHollowing technique.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Zeek-Formatted Threat Intelligence Feeds
C# Project contains a plenty of Advanced Anti-Debugging, Anti-Virtualization, Anti Dll-Injection and Anti-Hooking Techniques.
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
IP block lists for: Malware, Bots, Hackers, Sniffers, etc..
oisd blocklist
Block malware on your network with your DNS sinkhole using threat intelligence extracted from Emerging Threats rulesets.
🔍🔍 Malware scanner for cloud-native, as part of CI/CD and at Runtime 🔍🔍
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.