Display # |
1 |
MalwareInt Here you can view maps which display the geographical distribution of malware infection and time-series graphs of online and new bots (for fun there is a live map which will display a blip every time an infected computer pings one of my tracking servers).
|
4865 |
2 |
AVIEN (Anti Virus Information Exchange Network) AVIEN is an international on-line community dedicated to a cooperative, grassroots information sharing effort to reduce the impact of malicious code (viruses, worms, Trojan Horses, Spyware) and other related vulnerabilities.
|
6980 |
3 |
F-Secure Computer Virus Information Center Considered the industry standard source for up-to-date information on new viruses and hoax alerts.
|
6011 |
4 |
SecureList Contains a large collection of virus signatures.
|
3091 |
5 |
National Vulnerability Database (NVD) NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP).
|
4828 |
6 |
Spyware Guide SpywareGuide is the leading public reference site for spyware and greynet research, details about spyware, adware and greynet applications and their behaviors, all compiled in an extensive updated database.
|
4669 |
7 |
VirusTotal Virustotal is a service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
|
6400 |
8 |
Common Vulnerabilities and Exposures (CVE) CVE® International in scope and free for public use, CVE is a dictionary of publicly known information security vulnerabilities and exposures. CVE’s common identifiers enable data exchange between security products and provide a baseline index point for evaluating coverage of tools and services.
|
4555 |
9 |
MAEC™ International MAEC™ International in scope and free for public use, MAEC is a standardized language for encoding and communicating high-fidelity information about malware based upon attributes such as behaviors, artifacts, and attack patterns.
|
4603 |
10 |
The Anti-Spyware Coalition (ASC) The Anti-Spyware Coalition (ASC) is a group dedicated to building a consensus about definitions and best practices in the debate surrounding spyware and other potentially unwanted technologies.
|
4320 |
11 |
The Open Source Vulnerability Database (OSVDB) OSVDB is an independent and open source database created by and for the community. Our goal is to provide accurate, detailed, current, and unbiased technical information.
|
3769 |
12 |
Unmask Parasites Unmask Parasites is a simple online web site security service that helps reveal_hidden_illicit content (parasites) that hackers insert into benign web pages using various security holes.
|
5789 |
13 |
Badwarebusters.org BadwareBusters.org is a community of people working together to fight back against viruses, spyware, and other bad software.
|
5969 |
14 |
SpywareBlaster (FREE) SpywareBlaster Prevent the installation of spyware and other potentially unwanted software! Simple, effective, trusted.
|
3393 |
15 |
Immunet 3.0 Immunet 3.0, powered by ClamAV is a fast, fully featured Windows desktop Anti-Virus (AV) solution that utilizes the power of advanced cloud based detection techniques and the strength of the time tested ClamAV engine.
|
2541 |
16 |
MalwareURL Team The MalwareURL Team is a group of Internet security experts dedicated to fighting malware, Trojans and a multitude of other web-related threats. To check a suspicious web site or IP address, simply enter it in their Verify Web Site page.
|
6150 |
17 |
MalwareCity Our citizens are wise warriors fighting malware, willing to share their knowledge in order to breed an army ready to battle security threats.
|
4131 |
18 |
MalwareHelp.org MalwareHelp.org provides step-by-step instructions for cleaning common Malware and to prevent recurrence to those who are new to online security. They also offer current security news and articles analysis.
|
2478 |
19 |
Malware.lu Malware.lu is a repository of malware and technical analyses to security researchers. Malware.lu provides an expert team in malwares analyses and incident response for private and government entities.
|
3980 |
20 |
Cuckoo Sandbox In three words, Cuckoo Sandbox is a malware analysis system. What does that mean? It simply means that you can throw any suspicious file at it and in a matter of seconds Cuckoo will provide you back some detailed results outlining what such file did when executed inside an isolated environment.
|
6632 |
21 |
Emsisoft Anti-Malware Comprehensive PC protection against viruses, trojans, spyware, adware, worms, bots, keyloggers and rootkits.2 cleaning scanners in 1:Anti-Virus + Anti-Malware.
|
2504 |
22 |
Deep End Research Threat research and intelligence analysis with emphasis on malware, botnet tracking, underground economy and cybercrime.
|
2921 |
23 |
Emsisoft Emergency Kit 3.0 he Emsisoft Emergency Kit contains a collection of programs that can be used without a software installation to scan and clean infected computers for malware.
|
2897 |
24 |
Ad-Aware 11 Total Security Gathering awards from the professional reviewers and being praised by its users, the new Ad-Aware Free Antivirus + offers the best antivirus and anti-spyware protection for your PC. Give your computer the best anti-malware protection.
|
1889 |
25 |
The Exploit Database The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike.
|
9104 |
26 |
Malware Investigator Malware Investigator is a tool that provides users the ability to submit suspected malware files and within as little as an hour, receive detailed technical information about what the malware does and what it may be targeting.
|
2384 |
27 |
Virus Bulletin Virus Bulletin is a security information portal, testing and certification body with a formidable reputation for providing users with independent intelligence about the latest developments in the global threat landscape.
|
6281 |
28 |
hpHosts hpHosts is a community managed and maintained hosts file that allows an additional layer of protection against access to ad, tracking and malicious websites.
|
33886 |
29 |
vURL Online Quickly and safely dissect malicious or suspect websites.
|
1605 |
30 |
MalwareMustDie MalwareMustDie, as a white-hat security research workgroup, launched in August 2012, is an NPO media for security professionals and researchers gathered to form the work-flow to reduce malware infection in internet.
|
1953 |
31 |
WICAR.org The wicar.org website was designed to test the correct operation your anti-virus / anti-malware software.
|
6738 |
32 |
PyLocky Decryptor This decryptor is intended to decrypt the files for those victims affected by the ransomware PyLocky.
|
1258 |
|