sems – Sandbox and Virtual Machine Detection Tool

sems is a good tool that can be used by malware researchers to verify if the existing virtual environment detected by malwares.

Cerber Ransomware Used to Attack Office 365 Users

icrosoft Office 365 users were targeted by a massive malicious attack. Cybercriminals used a RansomWare virus called Cerber that was distributed over emails and encrypted users’ files.

TLS-Attacker – Java-based Framework for Analyzing TLS Libraries

TLS-Attacker is a Java-based framework for analyzing TLS libraries. It is able to send arbitrary protocol messages in an arbitrary order to the TLS peer, and define their modifications using a provided interface.

fsmon – Tool to monitor filesystem on Mobile OS

Fsmon is an open source tool that you can use to monitor filesystem on mobile OS including iOS, OS X, Android, FirefoxOS and Linux.

Ubiquiti AirOS routers targeted by destructive worm

Malware

Ubiquiti Company is alerting of malware that is targeting their network devices with vulnerable firmware. The Ubiquiti worm will infect the device and create an account on the compromised device. Next it will continue to target more devices within the

Routersploit- The Router Exploitation Framework

RouterSploit is an open source Framework that will help in penetration testing and post exploitation embedded devices.

al-khaser – Tool to stress anti-malware system

al-khaser is a PoC malware with good intentions that aims to stress your anti-malware system. It performs a bunch of nowadays malwares tricks and the goal is to see if you catch them all