- Resources About Anti-Virus and Anti-Anti-Virus, including 200+ tools and 1300+ posts
- Some other resources in collections about Payload/Shellcode/Obfuscation/PowerShell/Injection/RAT/Steganography.
- 中文
- veil -> (5)Tools (41)Post
- ASWCrypter -> (1)Tools
- AVIator -> (1)Tools (1)Post
- Avet -> (2)Tools (14)Post
- Avoidz -> (1)Tools
- BDF -> (2)Tools (13)Post
- CACTUSTORCH -> (3)Tools (6)Post
- DKMC -> (1)Tools (3)Post
- GreatSCT -> (1)Tools (2)Post
- Green-Hat-Suite -> (1)Tools
- HERCULES -> (1)Tools (8)Post
- Python-Rootkit -> (1)Tools
- SharpShooter -> (1)Tools (18)Post
- SpookFlare -> (1)Tools (2)Post
- TheFatRat -> (2)Tools (8)Post
- Venom -> (6)Tools (8)Post
- Winpayloads -> (1)Tools (4)Post
- nps_payload -> (2)Tools (3)Post
- zirikatu -> (1)Tools (1)Post
- unicorn -> (1)Tools
- Shellter -> (17)Post
- dr0p1t -> (1)Tools (3)Post
- phantom -> (1)Tools (1)Post
- morphaes -> (1)Tools (1)Post
- unibyav -> (1)Tools
- armor -> (1)Tools
- foolav -> (2)Tools (2)Post
- Inception -> (1)Tools
- CarbonCopy -> (1)Tools
- metasploitavevasion -> (1)Tools
- SideStep -> (1)Tools (1)Post
- nativepayload_dns -> (1)Tools
- HackTheWorld -> (1)Tools
- Salsa-tools -> (1)Tools
- mcreator -> (1)Tools
- Anti-Virus
- 白利用
- SysWhispers -> (1)Post
- Tools
- Post
- [1900Star][4m] [Py] veil-framework/veil generate metasploit payloads that bypass common anti-virus solutions
- [1515Star][11d] [Py] veil-framework/veil-evasion a tool designed to generate metasploit payloads that bypass common anti-virus solutions.
- [75Star][5y] [PS] cheetz/powertools Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.
- [73Star][8m] [Py] veil-framework/veil-catapult Veil Catapult is no longer supported
- [63Star][5y] [Py] veil-framework/veil-ordnance Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode
- 2019.10 [Cooper] Piercing The Veil: Server Side Request Forgery Attacks On Internal Networks - Alyssa Herrera
- 2019.01 [sans] The State of the Veil Framework
- 2018.09 [microsoft] Office VBA + AMSI: Parting the veil on malicious macros
- 2018.09 [microsoft] Office VBA + AMSI: Parting the veil on malicious macros
- 2018.06 [NetworkHeros] Ethical Hacking (CEH v10) : Undetectable payload with veil | Hack any Windows 10
- 2018.05 [cyberarms] Anti-Virus Bypass with Veil on Kali Linux
- 2018.05 [HackerSploit] Veil-Evasion - How To Generate Undetectable Payloads | Antivirus Bypass
- 2018.04 [alyssa] Piercing the Veil: Server Side Request Forgery to NIPRNet access
- 2018.03 [NDSSSymposium] NDSS2018 Veil: Private Browsing Semantics Without Browser-side Assistance
- 2017.06 [UltraHacks] Veil Evasion successful Installation on Kali Linux 3.0
- 2017.03 [n0where] Antivirus Evasion Framework: Veil Framework
- 2017.03 [fireeye] AntiVirus Evasion Reconstructed – Veil 3.0
- 2016.07 [JackkTutorials] How to Bypass antiviruses with Veil Evasion
- 2016.05 [JackkTutorials] How to install Veil Framework on Kali Linux 2016.1
- 2016.05 [tevora] Dissecting Veil-Evasion Powershell Payloads and Converting to a Bind Shell
- 2016.04 [cylance] Veil-Evasion Vulnerability Discovered by Cylance
- 2016.04 [hack] Veil Evasion: Payloads Made Easy
- 2016.02 [kalitutorials] Antivirus Evasion : Bypassing AV with Veil
- 2015.10 [christophertruncer] Veil-Framework and ChristopherTruncer Website Brute Force and Just-Metadata
- 2015.03 [harmj0y] Drilling deeper with Veil's PowerTools
- 2014.12 [cyberarms] Installing Veil Framework on Kali Linux
- 2014.08 [harmj0y] Finding Local Admin with the Veil-Framework
- 2014.07 [netspi] Bypassing AV with Veil-Evasion
- 2014.06 [harmj0y] Veil-PowerView: A Usage Guide
- 2014.04 [bluescreenofjeff] Fresh Veil
- 2014.01 [christophertruncer] Developing a Self-Brute Forcing Payload for Veil
- 2013.10 [cyberarms] Veil AV Bypass on Kali
- 2013.06 [hackingarticles] Veil – A Metasploit Payload Generator to Bypass Antivirus
- 2013.06 [cyberarms] Creating Remote Shells that Bypass Anti-Virus with “Veil”
- 2013.05 [christophertruncer] Veil – A Payload Generator to Bypass Antivirus
- 2010.05 [netspi] Echo Mirage: Piercing the Veil of Thick Application Security
- [273Star][2y] [Shell] abedalqaderswedan1/aswcrypter An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]
- [329Star][6m] [C#] ch0pin/aviator Antivirus evasion project
- 2014.04 [holisticinfosec] Browse this: & Oryon C Portable & WhiteHat Aviator
- [1095Star][11d] [C] govolution/avet AntiVirus Evasion Tool
- [3Star][1y] [C] govolution/avetosx AntiVirus Evasion Tool
- 2019.07 [govolution] Slides – Introduction to AVET
- 2018.09 [govolution] Avet setup.sh script
- 2018.08 [govolution] Paper AVET BLACKHAT USA ARSENAL 2018
- 2018.08 [govolution] Paper AVET BLACKHAT USA ARSENAL 2018
- 2018.03 [rapid7] Cavete Symantec Testimonium Exspirare Martiis (Beware the Symantec Certificates Expiring in March)
- 2017.11 [cybersecurityinterviews] 043 – David Navetta: The Year Of the Phishing Attack
- 2017.07 [govolution] Paper AVET Blackhat USA 2017
- 2017.06 [govolution] AVET video
- 2017.05 [govolution] AVET and unstaged payloads
- 2017.04 [govolution] Slides Owasp Meeting Cologne AVET
- 2017.03 [n0where] AntiVirus Evasion Tool: AVET
- [119Star][12d] [Ruby] m4sc3r4n0/avoidz Avoidz tool to bypass most A.V softwares
- [2475Star][14d] [Py] secretsquirrel/the-backdoor-factory Patch PE, ELF, Mach-O binaries with shellcode (NOT Supported)
- [788Star][3y] [Py] secretsquirrel/bdfproxy Patch Binaries via MITM: BackdoorFactory + mitmProxy. (NOT SUPPORTED)
- 2016.06 [secureallthethings] BDF Preprocessor and Going Forward
- 2015.12 [secureallthethings] Add PE Code Signing to Backdoor Factory (BDF)
- 2015.02 [secureallthethings] New BDF Feature: Import Table 'Patching'
- 2014.08 [toolswatch] Backdoor Factory Proxy (BDFProxy) v0.1 Released
- [598Star][3y] [Visual Basic .NET] mdsecactivebreach/cactustorch Payload Generation for Adversary Simulations
- [108Star][3y] [Shell] xillwillx/cactustorch_ddeauto OFFICE DDEAUTO Payload Generation script
- [51Star][12d] [Visual Basic] vysecurity/cactustorch Payload Generation for Adversary Simulations
- 2018.07 [mcafee] CactusTorch Fileless Threat Abuses .NET to Infect Victims
- 2018.07 [mcafee] CactusTorch Fileless Threat Abuses .NET to Infect Victims
- 2018.07 [mcafee] CactusTorch Fileless Threat Abuses .NET to Infect Victims
- 2018.06 [vysec] Payload Generation with CACTUSTORCH
- 2017.07 [mdsec] Payload Generation with CACTUSTORCH
- [761Star][1y] [Py] mr-un1k0d3r/dkmc DKMC - Dont kill my cat - Malicious payload evasion tool
- 2018.03 [govolution] Download & Exec PoC and DKMC
- 2018.03 [govolution] Download & Exec PoC and DKMC
- [778Star][2y] [Py] greatsct/greatsct generate metasploit payloads that bypass common anti-virus solutions and application whitelisting solutions.
- 2019.01 [hackingarticles] GreatSct – An Application Whitelist Bypass Tool
- [107Star][12d] [Ruby] green-m/green-hat-suite Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.
- [471Star][3y] [Go] egebalci/hercules HERCULES is a special payload generator that can bypass antivirus softwares.
- 2018.11 [astr0baby] Running MVS 3.8 on Hercules NetBSD arm64 Pinebook
- 2018.07 [SSTecTutorials] Hercules - Automated Free VPN Connection on Kali Linux 2018.2
- 2018.06 [DoktorCranium] Running Ubuntu 18.04 Server s390x in Hercules Mainframe simulator
- 2018.06 [astr0baby] Installing Ubuntu 18.04 Server s390x in Hercules Mainframe simulator
- 2018.06 [DoktorCranium] Mainframe Z/OS 1.10 Hercules on Linux
- 2016.09 [n0where] Special Customizable Payload Generator: Hercules
- 2016.06 [hackingarticles] Bypass All Antivirus and Hack Remote Windows 10 PC using Hercules
- [310Star][13d] [Py] 0xislamtaha/python-rootkit Python Remote Administration Tool (RAT) to gain meterpreter session
- [898Star][1y] [Visual Basic .NET] mdsecactivebreach/sharpshooter Payload Generation Framework
- 2019.03 [carbonblack] TAU Threat Intelligence Notification: Operation SharpShooter
- 2019.02 [mdsec] Macros and More with SharpShooter v2.0
- 2018.12 [mcafee] ‘Operation Sharpshooter’ Targets Global Defense, Critical Infrastructure
- 2018.12 [mcafee] ‘Operation Sharpshooter’ Targets Global Defense, Critical Infrastructure
- 2018.09 [countercept] Analyzing Sharpshooter – Part 2
- 2018.08 [countercept] Analyzing Sharpshooter - Part 2
- 2018.08 [0x00sec] Clientside Exploitation - Tricks of the Trade 0x01 - Sharpshooter + SquibblyTwo
- 2018.08 [countercept] Analyzing Sharpshooter – Part 1
- 2018.08 [countercept] Analyzing Sharpshooter - Part 1
- 2018.08 [morphisec] SharpShooter Pen Testing Framework Used by Attackers
- 2018.07 [n0where] Payload Generation Framework: SharpShooter
- 2018.06 [mdsec] FreeStyling with SharpShooter v1.0
- 2018.03 [mdsec] Payload Generation using SharpShooter
- 2015.06 [trendmicro] Cybercriminal Sharpshooters: Nigerian Scammers Use HawkEye to Attack Small Businesses
- [780Star][1y] [Py] hlldz/spookflare Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
- 2018.05 [n0where] Meterpreter Loader Generator: SpookFlare
- [3659Star][3m] [C] screetsec/thefatrat Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
- [20Star][4y] [C] exploit-install/thefatrat An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection
- 2020.03 [hakin9] TheFatRat - A Massive Exploiting Tool
- 2019.03 [HackerSploit] How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector
- 2017.11 [TheHackerStuff] TheFatRat - Hacking Over WAN - Embedding Payload in Original Android APK - Without Port Forwarding
- 2017.02 [n0where] Generate Backdoor With msfvenom: TheFatRat
- 2016.12 [TheHackerStuff] Kali Linux - TheFatRat - Creating an Undetectable Backdoor - Bypass all AntiVirus
- 2016.07 [hackingarticles] Hack Remote Windows 10 PC using TheFatRat
- [1192Star][9d] yzddmr6/webshell-venom Generate webshell that bypass AV
- [637Star][7d] [Shell] r00t-3xp10it/venom shellcode generator/compiler/handler (metasploit)
- [273Star][11d] [JS] yzddmr6/as_webshell_venom 免杀webshell无限生成工具蚁剑版
- [122Star][14d] [Py] wetw0rk/malicious-wordpress-plugin Simply generates a wordpress plugin that will grant you a reverse shell once uploaded. I recommend installing Kali Linux, as msfvenom is used to generate the payload.
- [100Star][26d] [Py] lockedbyte/cryptovenom Cryptovenom: The Cryptography Swiss Army Knife
- [8Star][28d] [Shell] manofftoday/venomdroid3 Script that easily creates, signs and AV bypass .apk metasploit reverse_tcp payload.
- 2019.06 [JosephDelgadillo] Learn System Hacking E20: Exploiting Android and iOS Devices with Venom
- 2018.02 [pentesttoolz] VENOM 1.0.15 – Metasploit Shellcode Generator/Compiler/Listener
- 2017.02 [UltraHacks] VenomLogger - Keylogger || PROMOTION ||
- 2016.02 [hackingarticles] Exploitation of Windows PC using Venom: Shellcode Generator
- 2016.01 [n0where] Shellcode Generator: Venom
- [1093Star][11m] [Py] nccgroup/winpayloads Undetectable Windows Payload Generation
- 2016.02 [charliedean] WinPayloads - Undetectable Windows Payload Generation
- 2016.01 [hackingarticles] Winpayloads: Undetectable Windows Payload Generation
- [331Star][12d] [Py] trustedsec/nps_payload This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources. Written by Larry Spohn (
- [32Star][2m] [Py] fsacer/nps_payload This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources. Written by Larry Spohn (
- 2019.03 [hackingarticles] nps_payload: An Application Whitelisting Bypass Tool
- 2017.08 [n0where] Intrusion Detection Avoidance Payload Generator: NPS_Payload
- 2017.07 [trustedsec] New Tool Release: NPS_Payload
- [136Star][3y] [Shell] pasahitz/zirikatu Fud Payload generator script
- [2209Star][4m] [Py] trustedsec/unicorn Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
- 2020.02 [crowdstrike] Gimme Shellter
- 2018.11 [securityartwork] Evading AV with Shellter. I also have Sysmon & Wazuh III. GAME OVER
- 2018.11 [securityartwork] Evading AV with Shellter. I also have Sysmon and Wazuh II
- 2018.11 [securityartwork] Evading AV with Shellter. I also have Sysmon and Wazuh I
- 2017.01 [DemmSec] HOW TO MAKE MALWARE UNDETECTABLE! (SHELLTER)
- 2016.08 [evi1cg] Shellter Custom payload
- 2015.12 [n0where] Dynamic Shellcode Injection: Shellter
- 2015.10 [cyberarms] Anti-Virus Bypass with Shellter 5.1 on Kali Linux
- 2015.08 [anti] Shellter V & Kali 2.0
- 2015.07 [cyberarms] Anti-Virus Bypass with Shellter 4.0 on Kali Linux
- 2015.07 [BsidesLisbon] BSidesLisbon2015 - Shellter - A dynamic shellcode injector - Kyriakos Economou
- 2014.08 [toolswatch] Shellter v1.7 A Dynamic ShellCode Injector – Released
- 2014.06 [toolswatch] [New Tool] Shellter v1.0 A Dynamic ShellCode Injector – Released
- 2013.12 [anti] A Shellter for your shellcode…
- [1034Star][2y] [Py] d4vinci/dr0p1t-framework create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
- 2017.07 [n0where] Advanced Stealthy Dropper: Dr0p1t Framework
- [778Star][4m] [Py] oddcod3/phantom-evasion Python antivirus evasion tool
- 2018.05 [pentesttoolz] Phantom Evasion – Python AV Evasion Tool – Generate (Almost) FUD Payload – Kali Linux 2018.2
- [262Star][2y] [Py] cryptolok/morphaes polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS
- 2016.07 [n0where] IDPS SandBox AntiVirus Stealth Killer: MorphAES
- [195Star][2y] [Py] mr-un1k0d3r/unibyav a simple obfuscator that take raw shellcode and generate executable that are Anti-Virus friendly.
- [186Star][2y] [Shell] tokyoneon/armor Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
- [177Star][1m] [C] hvqzao/foolav Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host
- [87Star][2m] [C] hvqzao/foolavc foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV
- 2016.05 [safebuff] Bypass Antivirus via foolav
- [307Star][2y] [Py] two06/inception Provides In-memory compilation and reflective loading of C# apps for AV evasion.
- [708Star][12m] [Py] paranoidninja/carboncopy A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
- [239Star][12d] [Shell] nccgroup/metasploitavevasion Metasploit AV Evasion Tool
- [112Star][3y] [C++] codewatchorg/sidestep Yet another AV evasion tool
- 2014.12 [securityledger] Cat and Mouse: Web Attacks Increasingly Sidestep WAF Protections
- [207Star][2y] [C#] damonmohammadbagher/nativepayload_dns C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses
- [328Star][2y] [Py] stormshadow07/hacktheworld An Python Script For Generating Payloads that Bypasses All Antivirus so far .
- [322Star][3m] [C#] hackplayers/salsa-tools ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched
- [139Star][12d] [Py] blacknbunny/mcreator 反向Shell生成器, 自带AV绕过技术
- [1064Star][10d] [C++] cisco-talos/clamav-devel ClamAV Development
- [409Star][11d] cisco-talos/clamav-faq ClamAV FAQ
- [354Star][15d] [Shell] extremeshok/clamav-unofficial-sigs ClamAV Unofficial Signatures Updater maintained by eXtremeSHOK.com
- [266Star][17d] [Shell] essandess/macos-fortress Firewall and Privatizing Proxy for Trackers, Attackers, Malware, Adware, and Spammers with Anti-Virus On-Demand and On-Access Scanning (PF, squid, privoxy, hphosts, dshield, emergingthreats, hostsfile, PAC file, clamav)
- [86Star][11d] [Dockerfile] mko-x/docker-clamav Dockerized open source antivirus for use with file sharing containers, REST API or TCP.
- [81Star][17d] [Py] momika233/clamav_0day_exploit ClamAV_0Day_exploit
- [60Star][12d] [Ruby] kobaltz/clamby ClamAV interface to your Ruby on Rails project.
- [43Star][7y] [Py] sketchymoose/totalrecall Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to find badness.
- [38Star][2m] [C++] cisco-talos/clamav-bytecode-compiler ClamAV ByteCode Compiler
- [35Star][2y] [Py] cisco-talos/casc IDA Pro plug-in to generate signatures
- [33Star][4m] [Perl] tripflex/cpsetup Intuitive bash/shell script to setup and harden/configure cPanel CentOS/RHEL server with ConfigServer Firewall, MailManage, MailQueue, Malware Detect, ClamAV, mod_cloudflare, CloudFlare RailGun, and many more applications and security tweaks
- [28Star][6m] brandonprry/clamav-fuzz A fuzz job for ClamAV
- [23Star][24d] geerlingguy/ansible-role-clamav Ansible Role - ClamAV.
- [11Star][1y] [C#] rmuch/clamav.managed ClamAV bindings for the .NET Framework, Mono and PowerShell. ClamAV.Managed is a library written in C# for the .NET Framework and Mono, providing managed bindings for the libclamav interface. It includes ClamAV.Managed.PowerShell, a set of PowerShell cmdlets for ClamAV scanning. It comes with sample code for building a GUI virus scanner applicat…
- [10Star][3m] [Py] abhinavbom/clara Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets
- [9Star][1y] [Go] monostream/muescheli A simple AntiVirus-as-a-Service implementation using ClamAV
- [4Star][1y] [Py] hestat/clamav-cortexanalyzer Analyzer for TheHive Cortex Soc platform. Allows you to run observables against default and custom ClamAV rules.
- [2Star][1m] [Ruby] simp/pupmod-simp-clamav The SIMP clamav Puppet Module
- 2019.12 [talosintelligence] ClamAV team shows off new Mussels dependency build automation tool
- 2018.09 [infosecinstitute] Gentoo Hardening: Part 4: PaX, RBAC and ClamAV [Updated 2018]
- 2017.02 [nviso] Hunting with YARA rules and ClamAV
- 2016.10 [hackers] Evading AV: Anatomy of ClamAV
- 2016.06 [calderonpale] Erm… ClamAV daemon can be shutdown with a simple SHUTDOWN command
- 2016.06 [calderonpale] Erm… ClamAV daemon can be shutdown with a simple SHUTDOWN command
- 2016.06 [foxglovesecurity] Finding pearls; fuzzing ClamAV
- 2015.09 [n0where] Robust ClamAV-based Linux Malware Scanner: MalScan
- 2015.06 [linux] Installing ClamAV on CentOS 7 and Using Freshclam
- 2015.02 [linux] Using ClamAV for Linux PCI DSS requirement 5: Malware
- 2013.12 [talosintelligence] A quick tutorial on ClamAV detection: Win.Adware.Bprotector
- 2012.11 [firebitsbr] Clamav – Fazendo scanning de arquivos suspeitos e movendo para uma pasta em específico
- 2012.09 [firebitsbr] Malware: Scanning com Adobe Malware Classifier/Clamav por possível Malwares em PDF
- 2012.08 [talosintelligence] ClamAV vs. Content IQ Test, part 4
- 2012.06 [hiddenillusion] XDP files and ClamAV
- 2012.05 [talosintelligence] ClamAV and Snort coverage for Flashback and Sabpub
- 2012.04 [talosintelligence] ClamAV vs. Content IQ Test, part 3
- 2012.03 [talosintelligence] ClamAV vs. Content IQ Test, part 2
- 2012.02 [talosintelligence] ClamAV vs. Content IQ Test, part 1
- 2011.04 [toolswatch] Malware Analysis: Classifying with ClamAV and YARA
- 2011.02 [talosintelligence] Blacklist.rules, ClamAV, and Data Mining
- 2011.02 [sans] Snort 2.9.0.4 is coming out Thursday, ClamAV 0.97 update released
- 2010.12 [talosintelligence] ClamAV 3.0 for Windows Open Beta
- 2010.09 [talosintelligence] Introduction to ClamAV's Low Level Virtual Machine (LLVM)
- 2010.08 [talosintelligence] ClamAV Release Announcements
- 2010.06 [talosintelligence] ClamAV for Windows
- 2010.04 [sans] ClamAV 0.94 EOL Reminder
- 2009.06 [talosintelligence] ClamAV DoJoSec Talk Addendum
- 2009.05 [jsunpack] Using ClamAV on the command line as an automatic unpacker
- 2009.01 [addxorrol] ClamAV and unpackers
- 2008.10 [talosintelligence] Update on Snort and ClamAV for ms08-067
- 2008.09 [talosintelligence] Logical signatures in ClamAV 0.94
- 2008.02 [virusbulletin] Trend vs. ClamAV patent row hots up
- 2007.12 [sans] New Vulnerabilities in ClamAV
- 2007.08 [sans] Principle of Most Privilege and the Snort/ClamAV Purchase
- 2007.04 [sans] New ClamAV version fixes buffer overflow vulnerability
- 2007.02 [sans] Clamav security vulnerabilities
- 2006.10 [sans] ClamAV fixes multiple vulnerabilities
- 2006.08 [sans] ClamAV versions up to 0.88.3 DoS
- 2005.11 [sans] ClamAV 0.87.1 released, fixes multiple security vulnerabilities
- 2005.07 [sans] ClamAV vulnerability; Con-fu
- 2005.05 [sans] GAO Report on DHS; ezSTUB; Worm.Gibe.F; BlueTooth Security? ClamAv MACosX
- 2005.05 [sans] Google Web Accelerator; Snort with ClamAV; RSA SecurID WebAgent Overflow
- [312Star][13d] [PHP] phpmussel/phpmussel PHP-based anti-virus anti-trojan anti-malware solution.
- [717Star][15d] [C] mohuihui/antispy AntiSpy is a free but powerful anti virus and rootkits toolkit.It offers you the ability with the highest privileges that can detect,analyze and restore various kernel modifications and hooks.With its assistance,you can easily spot and neutralize malwares hidden from normal detectors.
- 2019.11 [hakin9] Antispy - A Free But Powerful Anti Virus And Rootkits Toolkit
- [296Star][3y] [C++] develbranch/tinyantivirus TinyAntivirus is an open source antivirus engine designed for detecting polymorphic virus and disinfecting it.
- [493Star][3y] [C#] tlaster/yourav 宇宙级最轻量杀毒软件
- [166Star][30d] [C] armadito/armadito-av Armadito antivirus main repository
- [10Star][1y] [PHP] armadito/armadito-glpi Plugin Armadito for GLPI
- [5Star][1y] [JS] armadito/deprecated-web-ui Deprecated Armadito web user interface
- [197Star][12d] [Py] hanul93/kicomav KicomAV is an open source (GPL v2) antivirus engine designed for detecting malware and disinfecting it.
- [335Star][14d] [Java] widdix/aws-s3-virusscan Free Antivirus for S3 Buckets
- [107Star][2y] [C] formyown/alesense-antivirus 一款拥有完整交互界面与驱动级拦截能力的开源杀毒软件
- [33Star][3y] [Py] jkkj93/mint-webshell-defender 薄荷WEBSHELL防御系统,是一款WEBSHELL查杀/防御软件,采用PYTHON编写
- [26Star][4y] [Java] whyalwaysmea/mobilesafe 这是一个android版的手机卫士,包含一下功能:1.手机防盗 2. 黑名单设置 3.软件管理 4.进程管理 5.流量统计 6.缓存清理 7.手机杀毒 8.来电归属地显示 9.号码归属地查询 10.程序锁
- [12Star][4y] [C++] majian55555/mjantivirusengine Anti-virus engine in Windows using VC++ 6.0 and MFC. We applied windows multithreading in virus scan method and user interface. Using MFC encapsulated threads library and Win32 APIs as well.
- [9Star][5m] [VBScript] zelon88/hr-av A fully original Windows anti-virus client from HonestRepair using the same custom antivirus engine as our Cloud.
- [1Star][2y] zhiyuanwang-chengdu-qihoo360/superantispyware_poc SUPERAntiSpyware CVE
- 2020.02 [hexacorn] Stay positive Lolbins… not!
- 2020.02 [hexacorn] SettingSyncHost.exe as a LolBin
- 2020.01 [reegun] Curl.exe is the new rundll32.exe — LOLbin
- 2020.01 [reegun] LOLbin — ProtocolHandler.exe
- 2019.11 [talosintelligence] Hunting for LoLBins
- 2019.11 [hexacorn] Quo Vadis, Lolbin
- 2019.09 [cybereason] Glupteba Expands Operation and Toolkit with LOLBins And Cryptominer
- 2019.09 [hexacorn] Sitting on the Lolbins, 12
- 2019.08 [hexacorn] Sitting on the Lolbins, 10
- 2019.08 [hexacorn] Sitting on the Lolbins, 11
- 2019.08 [hexacorn] Sitting on the Lolbins, 9
- 2019.08 [hexacorn] Sitting on the Lolbins, 8
- 2019.08 [hexacorn] Sitting on the Lolbins, 7
- 2019.08 [hexacorn] Sitting on the Lolbins, 5
- 2019.08 [hexacorn] Sitting on the Lolbins, 6
- 2019.08 [hexacorn] Sitting on the Lolbins, 4
- 2019.08 [hexacorn] Sitting on the Lolbins, 3
- 2019.08 [hexacorn] Sitting on the Lolbins, 2
- 2019.08 [hexacorn] Sitting on the Lolbins, 1
- 2019.06 [cybereason] Adobe Worm Faker Uses LOLbins And Dynamic Techniques To Deliver Customized Payloads
- 2019.05 [hexacorn] msiexec.exe as a LOLBIN
- 2019.05 [hexacorn] VS2005_vcredist_x86.exe as a LOLBIN
- 2019.04 [cybereason] Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware
- 2019.04 [hexacorn] Installers – Interactive Lolbins, Part 2
- 2019.04 [hexacorn] Installers – Interactive Lolbins
- 2019.04 [hexacorn] Signed Nullsoft Plug-ins – potential Lolbins
- 2019.03 [hexacorn] Squirrel packages’ manager as a lolbin (a.k.a. many Electron apps are lolbins by default)
- 2019.01 [cybereason] Banking Trojan Delivered By LOLbins: How the Ramnit Trojan spreads via sLoad in a cyberattack
- 2019.01 [sans] LOLBin Detection Methods: Seven Common Attacks Revealed
- 2018.08 [hexacorn] A few more LOLBins…
- 2018.08 [hexacorn] Squirrel as a Lolbin
- 2018.08 [hexacorn] PrintDialog.exe – yet another Lolbin for loading DLLs
- 2018.05 [hexacorn] wab.exe as a LOLBin
- 2018.04 [oddvar] GPscript.exe – another LOLBin to the list
- 2018.04 [hexacorn] I shot the sigverif.exe – the GUI-based LOLBin
- 2018.04 [hexacorn] ExtExport – yet another LOLBin
- [564Star][1y] [ASP] landgrey/webshell-detect-bypass 绕过专业工具检测的Webshell研究文章和免杀的Webshell
- [465Star][3m] [C#] tidesec/bypassantivirus 远控免杀系列文章及配套工具,搜集汇总了互联网上的几十种免杀工具和免杀方法,并对免杀效果进行了一一测试,为远控的免杀和杀软对抗免杀提供参考。
- [1436Star][4m] [Py] ekultek/whatwaf Detect and bypass web application firewalls and protection systems
- [973Star][2y] [Py] trycatchhcf/cloakify CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
- [507Star][4m] [Go] cbeuw/cloak A censorship circumvention tool to evade detection against state adversaries
- [442Star][8d] [Assembly] jthuraisamy/syswhispers AV/EDR evasion via direct system calls.
- [435Star][7d] [PS] the-xentropy/xencrypt A PowerShell script anti-virus evasion tool
- [298Star][12m] [YARA] supportintelligence/icewater YARA rules for the detection of malware and malicious files. the anti-virus industry prefers names for a threat
- [220Star][3y] [C++] bee13oy/av_kernel_vulns Pocs for Antivirus Software‘s Kernel Vulnerabilities
- [196Star][14d] [Smali] sslab-gatech/avpass Tool for leaking and bypassing Android malware detection system
- [187Star][10d] [Py] tijme/angularjs-csti-scanner Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
- [182Star][3y] [PHP] lcatro/php-webshell-bypass-waf Share some experience about PHP WebShell bypass WAF and Anti-AV
- [177Star][3y] [Py] arno0x/shellcodewrapper Shellcode wrapper with encryption for multiple target languages
- [175Star][30d] [Go] vyrus001/go-mimikatz A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.
- [173Star][16d] [Py] rvn0xsy/cooolis-ms Cooolis-ms is a server that supports the Metasploit Framework RPC. It is used to work with the Shellcode and PE loader. To some extent, it bypasses the static killing of anti-virus software, and allows the Cooolis-ms server to communicate with the Metasploit server. Separation.
- [144Star][11d] [C++] ajayrandhawa/keylogger Keylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. Blackcat keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capture system screenshot and send to ftp server in given time.
- [135Star][3m] [C++] huoji120/antivirus_r3_bypass_demo 分别用R3的0day与R0的0day来干掉杀毒软件
- [131Star][2y] [Py] cisco-talos/bass a framework designed to automatically generate antivirus signatures from samples belonging to previously generated malware clusters
- [118Star][30d] [C] govolution/avepoc some pocs for antivirus evasion
- [116Star][21d] [C#] p0cl4bs/hanzoinjection injecting arbitrary codes in memory to bypass common antivirus solutions
- [106Star][14d] [Shell] jbreed/apkwash Android APK Antivirus evasion for msfvenom generated payloads.
- [100Star][1y] [C] kirillwow/ids_bypass 入侵检测系统(IDS)绕过PoC
- [100Star][4y] [Py] ym2011/scanbackdoor Webshell扫描工具,通过各种规则和算法实现服务器脚本后门查杀
- [99Star][29d] [Go] asche910/flynet A powerful TCP/UDP tool, which support socks5 proxy by tcp and udp, http proxy and NAT traversal. This tool can help you bypass gfw easily
- [89Star][11d] [Py] k8gege/scrun BypassAV ShellCode Loader (Cobaltstrike/Metasploit)
- [85Star][1m] [Py] llsourcell/antivirus_demo Antivirus Demo for Fresh Machine Learning #7
- [82Star][4y] [HTML] vah13/avdetection A simple way for detection the remote user's antivirus
- [76Star][2m] [Go] maliceio/malice-av Malice AntiVirus Plugins
- [72Star][4y] [Py] monnappa22/hollowfind a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect and divert the forensic analysis techniques
- [71Star][5y] [Py] robbyfux/ragpicker Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus products, collecting malware for another analyzer/zoo.
- [68Star][4m] [PHP] marcocesarato/php-antimalware-scanner AMWSCAN (Antimalware Scanner) is a php antimalware/antivirus scanner console script written in php for scan your project. This can work on php projects and a lot of others platform.
- [65Star][10d] [PHP] thekingofduck/bypassavaddusers 绕过杀毒软件添加用户
- [64Star][6y] [Py] andrew-morris/stupid_malware Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity
- [64Star][2m] [Py] az0ne/python_backdoor 过360主动防御360杀毒以前99%杀软的python后门
- [63Star][17d] [C#] two06/amsi_handler Automate AV evasion by calling AMSI
- [60Star][4y] [Batchfile] ayra/zipbomb About an old technology that still screws up some anti virus software
- [59Star][5m] [JS] evyatarmeged/humanoid Node.js package to bypass CloudFlare's anti-bot JavaScript challenges
- [56Star][3y] [Py] ahm3dhany/ids-evasion Evading Snort Intrusion Detection System.
- [56Star][2y] [C++] huoji120/av-killer Antivirus Killer
- [56Star][14d] [C#] damonmohammadbagher/nativepayload_reverseshell This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)
- [52Star][2m] [C] stonedreamforest/re_avkmgr 逆向小红伞杀毒软件驱动——avkmgr
- [46Star][30d] [Shell] jbreed/apkinjector Android APK Antivirus evasion for msfvenom generated payloads to inject into another APK file for phishing attacks.
- [45Star][1m] [Shell] rordi/docker-antivirus Docker antivirus & malware scanning (antivirus as a microservice / antivirus as a container)
- [44Star][9m] [HTML] unk9vvn/andtroj A tool for integrating the Metasploit payload with Android's healthy programs and bypassing antivirus
- [42Star][15d] [Py] hackedteam/test-av2 Automated antivirus test environment (new version)
- [42Star][4m] [C#] ryuzakih/cloudflaresolverre Cloudflare Javascript & reCaptcha challenge (I'm Under Attack Mode or IUAM) solving / bypass .NET Standard library.
- [41Star][9y] [C++] cr4sh/ptbypass-poc Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.
- [41Star][3m] [C++] hackshields/antivirus
- [41Star][4m] [C] ntraiseharderror/antihook PoC designed to evade userland-hooking anti-virus.
- [40Star][25d] [PS] curtbraz/invoke-neutralizeav Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting
- [39Star][23d] [Py] joxeankoret/tahh Source codes for "The Antivirus Hackers Handbook" book.
- [37Star][24d] [JS] truework/lambda-s3-antivirus Lambda Function to scan incoming S3 uploads by Truework
- [36Star][15d] [Py] hackedteam/test-av Automated antivirus test environment
- [34Star][2y] [C#] damonmohammadbagher/nativepayload_arp C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)
- [33Star][3y] [Shell] b3rito/trolo trolo - an easy to use script for generating Payloads that bypasses antivirus
- [27Star][4m] [HTML] rafaybaloch/sop-bypass-mini-test-suite This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing Same Origin Policy bypass issues with browsers. Due credits were given to the researchers whose Proof of concepts have been incorporated in this test suite. Please note that, this is just the beta version, the n…
- [26Star][24d] [C] devilogic/xvirus 一个早期的抗启发式查杀的WIN32免杀壳
- [26Star][10m] [C] souhailhammou/panda-antivirus-lpe The exploit for Panda AV LPE
- [25Star][2y] [C#] damonmohammadbagher/nativepayload_ip6dns C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses
- [25Star][5m] [C] visweswaran1998/cybergod-ksgmprh An open-source antivirus for windows
- [24Star][2m] [PHP] 3xp10it/xwebshell 免杀webshell集合
- [23Star][4y] [Py] d4vinci/anti_killer Kill Any Antivirus Using Python For Windows Users .
- [23Star][7m] [C#] lockfale/dotnetavbypass-master C# AV bypass jank
- [21Star][2m] [C] sanseolab/simpleavdriver Simple AntiVirus Driver example
- [20Star][14d] [PHP] pluginkollektiv/antivirus Useful plugin that will scan your theme templates for malicious injections. Automatically. Every day. For more blog security.
- [20Star][17d] ajayrandhawa/auto-screen-catpure It is primary designed to be hidden and monitoring the computer activity. Take a screenshot of desktop in hidden mode using Visual C++ and save automatically to 'jpeg' file in every 30 second. 60+ Most Popular antivirus not detect this application while it is running on background.
- [19Star][25d] [C] credativ/pg_snakeoil The PostgreSQL Antivirus #pgSnakeOil
- [18Star][6m] [C] visweswaran1998/mrida An opensource antivirus implementation - Successor of CyberGod KSGMPRH
- [17Star][13d] [HTML] fmind/euphony Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
- [17Star][9m] [Java] wh1t3p1g/monitorclient 网站实时监控文件变动及webshell检测查杀工具
- [15Star][4m] [PHP] mahi2/befree Website Security, Antivirus & Firewall || a powerful application that can secure your website against hackers, attacks and other incidents of abuse
- [15Star][3y] payatu/quickheal CVE-2017-5005 for Quick Heal Antivirus
- [15Star][1m] [C] stonedreamforest/re_avdevprot 逆向小红伞杀毒软件驱动——avdevprot
- [15Star][12m] [PHP] tengzhangchao/maskfindshell linux下webshell查杀工具
- [15Star][3m] [C] zzy590/basiclibpp A powerful library for inline-hook,lock,compress etc,and it is useful for anti-virus software.
- [15Star][12d] [JS] rubaljain/frida-jb-bypass Frida script to bypass the iOS application Jailbreak Detection
- [12Star][1y] [Py] huseck/scan_kill_php_shell 针对PHP网马的正则查杀
- [12Star][16d] [Go] malice-plugins/windows-defender Malice Windows Defender AntiVirus Plugin
- [12Star][2m] [C] serializingme/emofishes Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the ones setup for malware analysis).
- [11Star][2m] behzadmagzer/epcrypter A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads
- [11Star][16d] [Py] tanc7/dark-lord-obama AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
- [10Star][2y] [C#] arunvnnk/avbypass Techniques that i have used to evade anti-virus during pen tests.
- [8Star][5y] [C++] hkhk366/memory_codes_injection Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.
- [8Star][6m] [Py] nikhilraghava/ml-antivirus An antivirus powered by machine learning.
- [8Star][1y] [Py] xedtech/ceriumav Project Cerium Antivirus
- [8Star][3m] [C#] fashionproof/uglyexe UglyEXe - bypass some AVs
- [7Star][2m] [C] idigitalflame/inyourmems Windows Antivirus Evasion and Memory Injection
- [7Star][2y] zhiyuanwang-chengdu-qihoo360/malwarebytes_poc Malwarebytes Antivirus CVE
- [7Star][7m] [JS] ecstatic-nobel/not-anti-virus An attmept to block malware before AV scans it.
- [6Star][10m] [Ruby] duke-libraries/ddr-antivirus Antivirus service wrapper
- [6Star][1y] 0x4xleakr/darkcrypter DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.
- [5Star][2y] [Perl] armadito/armadito-agent Armadito Agent for Antiviruses management
- [5Star][8m] [Py] henriksb/virustotalscanner Scan suspicious applications with over 60 different anti-viruses with a mere two clicks and five seconds!
- [5Star][12m] [Go] malice-plugins/kaspersky Malice Kaspersky Antivirus Plugin
- [4Star][3m] [Py] technowlogy-pushpender/apkinfector Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK
- [4Star][4m] [PHP] guardiran/cloudhound CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to detect original Server's IP
- [3Star][2y] [JS] cranic/node-virus EICAR testing signature for anti-virus testing purpouses.
- [3Star][3m] [Java] gabriellhuver/baafjava Metasploit powershell exec in java, bypass any antivirus. You can enter the url .txt powershell payload script, and the jar download and exec this on the victim pc.
- [3Star][1y] [Go] malice-plugins/mcafee Malice McAfee AntiVirus Plugin
- [3Star][2y] [HTML] raikar/attack-docs This repo contains comprehensive lists of attack payloads known to cause issues like OS command injection, directory listings, directory traversals, source exposure, file upload bypass, authentication bypass, http header crlf injections, and more
- [2Star][2y] [C++] k0keoyo/vir.it-explorer-anti-virus-null-pointer-reference-poc
- [2Star][2y] kernelm0de/cve-2018-8090 DLL Hijacking in Quickheal Total Security/ Internet Security/ Antivirus Pro (Installers)
- [2Star][5m] [Py] mado-95/madcrypt Simple script that strips/compresses/signs any PE in an effort to lower antivirus detection ratio.
- [2Star][3m] rubyfly/k7antivirus_poc K7AntiVirus_POC
- [2Star][2y] [C] sqdwr/deletefilebycreateirp 通过创建Irp删除文件,代码抄袭自某杀毒软件*86部分,因此可以看到IDA痕迹
- [2Star][2y] zhiyuanwang-chengdu-qihoo360/escanav_poc escanAntivirus CVE
- [2Star][2y] zhiyuanwang-chengdu-qihoo360/k7_antivirus_poc K7 Antivirus CVE
- [1Star][7y] [Py] daveclowe/mcbup Python script which converts McAfee quarantine files back to their native format, generates an MD5 hash, and queries the VirusTotal API for antivirus scan results.
- [1Star][2y] [Java] pnfsoftware/jeb2-plugin-avqu JEB Plugin Extractor for Anti-Virus Quarantine files
- [1Star][3y] [Java] sanjeet990/android-antivirus-project This is an Antivirus project for Android that I created for my college project.
- [1Star][4y] [Java] sushanthikshwaku/antiv Anti virus app for android using VirusTotal
- [1Star][2y] zhiyuanwang-chengdu-qihoo360/jiangmin_antivirus_poc Jiangmin_Antivirus_CVE
- [1Star][2y] zhiyuanwang-chengdu-qihoo360/maxsecureantivirus_poc MaxSecureAntivirus CVE
- [1Star][2y] zhiyuanwang-chengdu-qihoo360/nprotectantivirus_poc nProtectAntivirus_CVE
- [1Star][2y] zhiyuanwang-chengdu-qihoo360/zillyaantivirus_poc ZillyaAntivirusCVE
- [0Star][2y] d0nemkj/poc_bsod Antivirus software's BSOD poc
- [0Star][2y] [C++] mmmxny/k7-antivirus
- [0Star][2y] eonrickity/cve-2017-0213 Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.
- [0Star][4m] [Py] giacomoferro/antivirus-detection-analysis Software Security project - Malware Detection Analysis A.A. 2019/2020.
- [NoneStar][C#] med0x2e/noamci Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().
- [NoneStar]hack2fun/bypassav Cobalt Strike插件,用于快速生成免杀的可执行文件
- [NoneStar][C] reddyyz/ghostshell Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
- 2020.05 [eforensicsmag] Simple Techniques to Bypass AVs | By Siddharth Sharma
- 2020.05 [secplicity] MedusaLocker Ransomware Will Bypass Most Antivirus Software
- 2020.03 [kitploit] Oce Colorwave 500 CSRF / XSS / Authentication Bypass
- 2020.03 [zerodayinitiative] Trend Micro Worry-Free Business Security Directory Traversal Authentication Bypass Vulnerability
- 2020.03 [hakin9] Xencrypt - A PowerShell script anti-virus evasion tool
- 2020.02 [markmotig] UglyEXe — bypass some AVs
- 2020.02 [virtuesecurity] Evading Antivirus with Better Meterpreter Payloads
- 2020.01 [ionize] Detecting AMSI Bypass
- 2019.12 [andrea] Bypass Win AV and Firewall with powershell code
- 2019.12 [LoiLiangYang] Evade Detection with Auto Process Migration on Shell Exploit (Cybersecurity)
- 2019.12 [sarang6489] Root Detection Bypass With Frida.
- 2019.12 [trendmicro] Waterbear is Back, Uses API Hooking to Evade Security Product Detection
- 2019.12 [sarang6489] Root Detection Bypass By Manual Code Manipulation.
- 2019.11 [eforensicsmag] Bypassing AVs by C# Managed Code (Reverse Shell) | By Damon Mohammadbagher
- 2019.11 [deepsec] ROOTS 2019 Talk: Shallow Security: on the Creation of Adversarial Variants to Evade ML-Based Malware Detectors – Fabricio Ceschin
- 2019.11 [two06] AMSI as a Service — Automating AV Evasion
- 2019.11 [dodgethissecurity] Hancitor. Evasive new waves, and how COM objects can use Cached Credentials for Proxy Authentication.
- 2019.10 [trustedsec] Discovering the Anti-Virus Signature and Bypassing It
- 2019.10 [vmray] [Risky Business Podcast] 3 Approaches that Evade Static Machine Learning Detection
- 2019.09 [carbonblack] CB TAU Threat Intelligence Notification: Qbot/Qakbot Attempts to Evade Detection By Overwriting Itself
- 2019.06 [bugbountywriteup] Antivirus Evasion with Python
- 2019.05 [arxiv] [1905.13409] Bypassing Backdoor Detection Algorithms in Deep Learning
- 2019.05 [benoit] PowerShell AV evasion
- 2019.04 [astr0baby] Metasploit payloads evasion against Linux AV
- 2019.04 [fbotes2] Advance AV Evasion Symantec and P4wnP1 USB
- 2019.04 [crowdstrike] Mimikatz in the Wild: Bypassing Signature-Based Detections Using the “AK47 of Cyber”
- 2019.03 [f5] How Malware Evades Detection
- 2019.03 [govolution] Antivirus Evasion on OSX
- 2019.03 [0x00sec] [FUN] Bypass XSS Detection WAF
- 2019.03 [yoroi] Evading AV with JavaScript Obfuscation
- 2019.03 [bromium] Tricks and COMfoolery: How Ursnif Evades Detection
- 2019.02 [cybereason] The Newest Variant of the Astaroth Trojan Evades Detection in the Sneakiest Way
- 2019.01 [paloaltonetworks] Malware Used by “Rocke” Group Evolves to Evade Detection by Cloud Security
- 2019.01 [0x00sec] Bypassing Crowdstrike Falcon detection, from phishing email to reverse shell
- 2019.01 [lookout] Lookout researchers disable Android malware designed to evade detection
- 2019.01 [proofpoint] Phishing template uses fake fonts to decode content and evade detection
- 2019.01 [abend] Bypassing anti virus using powershell
- 2018.12 [cyberarms] AV & AMSI Bypass with Magic Unicorn
- 2018.11 [0x00sec] New AV Bypass techniques
- 2018.10 [checkpoint] How To Detect LibSSH Authentication Bypass for EC2 Instances | Check Point Software Blog
- 2018.10 [rapid7] Metasploit's First Antivirus Evasion Modules: Evading AV Detection
- 2018.10 [reversinglabs] eWeek: Cisco Talos and ReversingLabs warn that the Adwind Remote Access Trojan (RAT) has added capabilities that enable it bypass some anti-virus technologies
- 2018.09 [DoktorCranium] Bypassing latest Avast AV on Windows 10 x86_64
- 2018.09 [astr0baby] Bypassing latest Avast AV on Windows 10 x86_64
- 2018.09 [arxiv] [1809.00615] Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques
- 2018.08 [alienvault] Antivirus Evasion for Penetration Testing Engagements
- 2018.08 [arxiv] [1808.04218] Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
- 2018.08 [radware] Drive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection
- 2018.06 [injection] OSCP Journey Part 15.0 (Bettercap, Merlin, and 1000 subs!/MitM+AV Evasion)
- 2018.06 [n00py] Executing Meterpreter in Memory on Windows 10 and Bypassing AntiVirus (Part 2)
- 2018.06 [n00py] Executing Meterpreter in Memory on Windows 10 and Bypassing AntiVirus
- 2018.05 [ironcastle] Antivirus Evasion? Easy as 1,2,3, (Fri, May 25th)
- 2018.05 [sans] Antivirus Evasion? Easy as 1,2,3
- 2018.04 [trendmicro] Necurs Evolves to Evade Spam Detection via Internet Shortcut File
- 2018.03 [arxiv] [1803.04173] Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
- 2018.03 [crowdstrike] Too Accessible: How CrowdStrike Falcon Detects and Prevents Windows Logon Bypasses
- 2018.03 [infosecinstitute] Android Root Detection Bypass by Reverse Engineering APK
- 2018.02 [marcoramilli] Control Flow Integrity: a Javascript Evasion Technique
- 2018.01 [trustedsec] Very high level of confidence’ Russia used Kaspersky software for devastating NSA leaks, Featuring David Kennedy – Yahoo Finance
- 2018.01 [pentesttoolz] How to Create Undetectable Python Payloads that Bypass Antiviruses – Kali Linux 2017.3
- 2018.01 [digitalforensicstips] Ghostwriting for Antivirus Evasion in 2018
- 2018.01 [hyperiongray] Malicious Excel DDE Execution with ML AV Bypass and Persistence
- 2017.10 [insinuator] Extract Non-Exportable Certificates and Evade Anti-Virus with Mimikatz and Powersploit
- 2017.10 [icebrg] FOOTPRINTS OF FIN7: Pushing new techniques to evade detection
- 2017.08 [cybereason] Cerber ransomware variants now actively try to detect and evade Canary files
- 2017.08 [crowdstrike] How to Block Malicious PowerShell Activity: Bypassing Traditional AV
- 2017.07 [pentestlab] Bypassing Antivirus & Host Intrusion Prevention Systems
- 2017.07 [hackers] How to Evade Detection with proxychains
- 2017.07 [DoktorCranium] Bypassing Antivirus on modern OSX with metasploit
- 2017.06 [govolution] Using msf alpha_mixed encoder for antivirus evasion
- 2017.06 [eyeofrablog] Bypass antivirus with simple RTF tricks.
- 2017.05 [arxiv] [1705.07263] Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
- 2017.05 [crowdstrike] How to Install Falcon Antivirus (AV) on the Mac Platform
- 2017.05 [attify] Bypass Jailbreak Detection with Frida in iOS applications
- 2017.05 [attify] Bypass Jailbreak Detection with Frida in iOS applications
- 2017.05 [hackers] How to Evade AV with OWASP-ZSC, Part 1
- 2017.05 [mcafee] Cerber Ransomware Evades Detection With Many Components
- 2017.05 [mcafee] Cerber Ransomware Evades Detection With Many Components
- 2017.04 [countercept] AV Bypass Techniques through an EDR Lens
- 2017.04 [countercept] AV Bypass Techniques through an EDR Lens
- 2017.04 [hipaajournal] Webroot AV Update Failure Causes Havoc: Windows System Files and EXE Files Quarantined
- 2017.04 [securelist] Old Malware Tricks To Bypass Detection in the Age of Big Data
- 2017.03 [cobbr] ObfuscatedEmpire - Use an obfuscated, in-memory PowerShell C2 channel to evade AV signatures
- 2017.03 [redcanary] Bypassing Application Whitelisting: How IT Teams Can Detect It
- 2017.01 [crowdstrike] How to Replace Traditional Antivirus (AV) with CrowdStrike Falcon
- 2017.01 [HackersOnBoard] DEF CON 24 - The Remote Metamorphic Engine - Detecting - Evading - Attacking
- 2017.01 [averagesecurityguy] Bypassing AntiVirus with Golang
- 2017.01 [blackhillsinfosec] How to Bypass Anti-Virus to Run Mimikatz
- 2016.12 [HackingMonks] Honeypots (create,detect and bypass)
- 2016.12 [kalitutorials] Use Python To Detect And Bypass Web Application Firewall
- 2016.12 [pentest] Art of Anti Detection 1 – Introduction to AV & Detection Techniques
- 2016.11 [morphisec] New Wave of Hancitor Comes with New Evasive Techniques
- 2016.11 [0x00sec] Pirating Illegally - How to Evade ISP Detection
- 2016.11 [vkremez] Bypassing Anti-Virus Signature Detection
- 2016.10 [brokenbrowser] Detecting Local Files to Evade Analysts (IE)
- 2016.08 [blackhillsinfosec] Powershell Without Powershell – How To Bypass Application Whitelisting, Environment Restrictions & AV
- 2016.08 [LoiLiangYang] How Does Antivirus Software Work And How To Evade It
- 2016.08 [fortinet] New Era in Anti-Virus Detection Evasions
- 2016.07 [netnea] Having Fun with New Evasions
- 2016.07 [virusbulletin] Paper: The Journey of Evasion Enters Behavioural Phase
- 2016.07 [blackhillsinfosec] Three Simple Disguises for Evading Antivirus
- 2016.06 [duo] Ransomware Evades Antivirus and Microsoft Security Tools, Targets Office 365
- 2016.06 [mcafee] Threat Actors Employ COM Technology in Shellcode to Evade Detection
- 2016.06 [mcafee] Threat Actors Employ COM Technology in Shellcode to Evade Detection
- 2016.05 [trustlook] Fake Adobe Flash App Evades Most Anti Virus Detection, Manipulates Phone by Command & Control Server in Latvia
- 2016.04 [rsa] Detection of Squiblydoo COM+ Whitelist Bypassing with ECAT
- 2016.04 [blackhillsinfosec] How to Bypass Application Whitelisting & AV
- 2016.04 [gracefulsecurity] Adventures in Anti-Virus Evasion
- 2016.04 [arno0x0x] Meterpreter stage AV/IDS evasion with powershell
- 2016.03 [hackingarticles] Hack Remote Windows 10 PC using ARCANUS (Bypass All Antivirus)
- 2016.03 [attactics] Bypassing Antivirus With Ten Lines of Code or (Yet Again) Why Antivirus is Largely Useless
- 2016.02 [notsosecure] Bypassing Jailbreak Detection in iOS
- 2016.01 [cylance] CylancePROTECT® is the First Signature-less Next Generation Antivirus to be Certified by AV-TEST
- 2016.01 [paloaltonetworks] Angler Exploit Kit Continues to Evade Detection: Over 90,000 Websites Co
- 2015.12 [ensilo] You’re so predictable: the AV vulnerability that bypasses mitigations
- 2015.12 [alienvault] Cherry Picker POS Malware Scraping Memory and Evading Detection
- 2015.10 [blackhillsinfosec] Modifying Metasploit x64 template for AV evasion
- 2015.10 [trendmicro] New Headaches: How The Pawn Storm Zero-Day Evaded Java’s Click-to-Play Protection
- 2015.09 [kaspersky] AV-Comparatives awards Kaspersky Lab’s Anti-phishing technology
- 2015.08 [alienvault] FF-RAT Uses Stealth Tactics to Evade Endpoint Detection
- 2015.07 [ly0n] Basic AV bypass
- 2015.07 [ly0n] Basic AV bypass
- 2015.07 [hackingarticles] Bypass Antivirus and Hack Remote Windows PC with shelter
- 2015.07 [mcafee] Threat Actors Use Encrypted Office Binary Format to Evade Detection
- 2015.07 [mcafee] Threat Actors Use Encrypted Office Binary Format to Evade Detection
- 2015.06 [sans] CVE-2014-4114 and an Interesting AV Bypass Technique
- 2015.06 [wojdwo] Bypassing malware detection mechanisms in online banking
- 2015.06 [mrg] Generic bypass of next-gen intrusion / threat / breach detection systems
- 2015.05 [trustwave] Malicious Macros Evades Detection by Using Unusual File Format
- 2015.04 [trustlook] Trustlook Antivirus & Mobile Security Ranked Top In AV-TEST With Best Score
- 2015.04 [lastline] Malware in the Wild: Evolving to Evade Detection
- 2015.03 [mcafee] POS Malware Uses Time-Stamp Check to Evade Detection
- 2015.03 [mcafee] POS Malware Uses Time-Stamp Check to Evade Detection
- 2015.03 [y0nd13] Bypassing AV in 2015
- 2015.03 [securitysift] peCloak.py – An Experiment in AV Evasion
- 2015.03 [sans] How Malware Generates Mutex Names to Evade Detection
- 2015.03 [duo] Password-Stealing Tool Targets Windows; Evades Antivirus
- 2015.02 [leonjza] a trivial iOS jailbreak detection bypass
- 2014.11 [arxiv] [1411.6777] Modified Apriori Approach for Evade Network Intrusion Detection System
- 2014.08 [sevagas] Bypass Antivirus Dynamic Analysis
- 2014.07 [privacy] AV Evasion 6: Best-Performing Tactics
- 2014.07 [privacy] AV Evasion 5: Blending in Instead of Hiding the Bad
- 2014.07 [privacy] AV Evasion 4: Encoders and Fuzzy NOPs Fail
- 2014.07 [privacy] AV Evasion 3: EXE Templates and Run-Time Dynamic Linking
- 2014.06 [hackwhackandsmack] JavaRMI Remote Class Loading Exploitation with AV Bypass
- 2014.06 [privacy] AV Evasion 2: Hurdles for Metasploit Payload Execution
- 2014.06 [privacy] AV Evasion: Lessons Learned
- 2014.05 [govolution] Article about Antivirus Evasion
- 2014.05 [mcafee] Necurs, Zbot Droppers Use Obfuscated Windows XP Detection to Bypass Automated Analysis
- 2014.05 [mcafee] Necurs, Zbot Droppers Use Obfuscated Windows XP Detection to Bypass Automated Analysis
- 2014.05 [rapid7] Is AV dead? Why Symantec's executive is only half right about the state of anti-virus software
- 2014.05 [rapid7] Anti-Virus Evasion Makes Vulnerability Validation More Accurate
- 2014.04 [rapid7] From the Trenches: AV Evasion With Dynamic Payload Generation
- 2014.03 [rapid7] New Metasploit 4.9 Helps Evade Anti-Virus Solutions, Test Network Segmentation, and Increase Productivity for Penetration Testers
- 2014.01 [ethicalhackingnews] How to Change the Signature of Metasploit Payloads to Evade Antivirus Detection
- 2014.01 [rapid7] Security Guide - Evading Anti-Virus Detection
- 2013.10 [deepsec] DeepSec 2013 Talk: Easy Ways To Bypass Anti-Virus Systems
- 2013.10 [rsa] New Kazy Variant Evades Research Detection Using "Chameleon Encoding"
- 2013.08 [trustlook] Craig Young's POC malware bypassed all security detection
- 2013.08 [hackingarticles] Bypass Antivirus and Hack Remote Windows PC with Syringe
- 2013.06 [reverse] Gone in 59 seconds: tips and tricks to bypass AppMinder’s Jailbreak detection
- 2013.05 [trendmicro] Blackhole Spam Run Evades Detection Using Punycode
- 2013.04 [rsa] Zeus C&C Server Poses as Google to Evade Detection
- 2013.04 [mcafee] Phishing Threat Uses UTF-8 BOM in ZIP Signature to Evade Detection
- 2013.03 [malwarebytes] New Exploit Kit, Ransomware and AV evasion
- 2013.02 [mcafee] Evasion Techniques: Encoded JavaScript Attacks PDF Files
- 2013.01 [netspi] Bypassing Anti-Virus with Metasploit MSI Files
- 2013.01 [rapid7] Evading Anti-Virus Detection - Whiteboard Wednesday
- 2013.01 [netspi] 10 Evil User Tricks for Bypassing Anti-Virus
- 2012.12 [hackingarticles] Bypassing Antivirus using Multi Pyinjector Shell Code Injection in SET Toolkit
- 2012.11 [cyberarms] Bitdefender wins Anti-Virus Test while Microsoft AV Failed Certification
- 2012.09 [y0nd13] Bypass PHP ShellDetector: Poorman Style
- 2012.08 [christophertruncer] Bypass Antivirus with Meterpreter as the Payload & Hyperion Fun
- 2012.08 [hackingarticles] Hack Windows7 PC using Powershell Attack Vector in Social Engineering Toolkit (Bypassing Antivirus)
- 2012.08 [cyberarms] Social Engineering Toolkit: Bypassing Anti-Virus using Powershell
- 2012.07 [rapid7] New Metasploit 4.4: Risk Validation for Vulnerability Management with Nexpose, Improved AV Evasion, and Faster UI
- 2012.07 [trustedsec] Egress Buster Reverse Shell and Bypassing AV
- 2012.07 [DoktorCranium] Comodo Internet Security AV & Sandbox bypass
- 2012.02 [reverse] AV-monster: the monster that loves yummy OS X anti-virus software
- 2011.05 [y0nd13] Evading Antivirus Emulator using stealth meterpreter
- 2011.01 [elearnsecurity] Evading Antiviruses with msfencode
- 2010.12 [scrt] Bypass “Simple” de proxy antivirus
- 2010.08 [console] Bypassing AntiVirus With Process Injection
- 2010.06 [trustedsec] Anti-Virus Evasion through JavaScript Obfuscation
- 2010.04 [krebsonsecurity] Fake Anti-virus Peddlers Outmaneuvering Legitimate AV
- 2009.05 [skullsecurity] Bypassing AV over the Internet with Metasploit
- 2008.01 [oberheide] Detecting and Evading CWSandbox
- 2006.12 [sans] Malformed MIMEs can bypass AV
- 2006.06 [sans] Snort URL evasion vulnerability patched and version 2.6.0 available
- 2005.11 [sans] F-Prot Anti-Virus Scanning Engine Bypass
- 2004.10 [sans] Multiple anti-virus software evasion
- 2018.08 [code610] venome.sh - simple msfvenom "generator"
- 2017.09 [n0where] MSFvenom Payload Creator: MSFPC
- 2017.07 [hackers] Metasploit Basics, Part 9: Using msfvenom to Create Custom Payloads
- 2016.07 [korznikov] msfvenom Bash Completion Generator
- 2016.05 [blackhillsinfosec] Advanced Msfvenom Payload Generation
- 2015.07 [n0where] Msfvenom Payload Creator: MPC
- 2014.03 [rapid7] Like msfvenom? Here's A Faster Way to Generate Stand-alone Metasploit Payloads
- 2019.11 [LoiLiangYang] Live Android Hacking with MSFVenom
- 2019.04 [JosephDelgadillo] Learn System Hacking E9: Creating Windows Payloads with MSFvenom
- 2019.04 [HackerSploit] How To Setup Port Forwarding For Msfvenom Android Payloads (WAN)
- 2019.03 [HackerSploit] Manually Embedding Msfvenom Payloads In APK's - Proof Of Concept
- 2018.12 [HackerSploit] Generating Shellcode With Msfvenom
- 2018.07 [HackerSploit] Generating Android Payloads With Msfvenom - Reverse TCP/Meterpreter
- 2018.06 [HackerSploit] AV/IDS Evasion With Msfvenom - Payload Encoding Through Obfuscation
- 2018.03 [hackingarticles] Generating Reverse Shell using Msfvenom (One Liner Payload)
- 2017.11 [hackingarticles] Msfvenom Tutorials for Beginners
- 2017.04 [hackingarticles] 2 ways to use Msfvenom Payload with Netcat
- 2017.03 [hackingarticles] Hiding Shell with Prepend Migrate using Msfvenom
- 2017.03 [hackingarticles] Capture VNC Session of Remote PC using Msfvenom
- 2016.07 [hackingarticles] Hack Remote Windows PC using Macros with Msfvenom
- 2012.08 [hackingarticles] Hack Remote Windows 7 PC Easy Way (Msfvenom Tutorial)
- 2020.03 [0x00sec] How to protect my virus.exe from Anti-virus with Kernel-Mode Rootkit
- 2020.01 [0x00sec] Anti-virus Exploitation: Malwarebytes 4.0.4 - Protection Not Found - Hijacking Malwarebytes via COM IPC
- 2020.01 [BlackHat] Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator
- 2019.11 [0x00sec] Anti-virus Exploitation: Local Privilege Escalation in K7 Security (CVE-2019-16897)
- 2019.11 [0x00sec] How do you think malware authors will adapt to AI/ML based Anti-Virus detection?
- 2019.10 [virusbulletin] Stalkerware poses particular challenges to anti-virus products
- 2019.10 [HackersOnBoard] Windows Offender Reverse Engineering Windows Defender's Antivirus Emulator
- 2019.10 [sentinelone] CyberSecurity Breakthrough Awards Name SentinelOne Overall Antivirus Solution Provider of 2019
- 2019.09 [TechnicalMujeeb] Termux Antivirus - install & use Antivirus in Termux - android
- 2019.08 [rce4fun] Comodo Antivirus - Sandbox Race Condition Use-After-Free (CVE-2019-14694)
- 2019.07 [microsoft] How Windows Defender Antivirus integrates hardware-based system integrity for informed, extensive endpoint protection
- 2019.05 [rce4fun] Panda Antivirus - Local Privilege Escalation (CVE-2019-12042)
- 2019.02 [cybereason] Astaroth Malware Uses Legitimate OS and Antivirus Processes to Steal Passwords and Personal Data
- 2019.01 [crowdstrike] Next-Gen Antivirus
- 2019.01 [kaspersky] SiliVaccine: Antivirus from North Korea
- 2019.01 [csoonline] Best Android antivirus? The top 13 tools
- 2019.01 [trustlook] Trustlook is one of the best Anti-Virus engines provider
- 2019.01 [trustlook] Trustlook is one of the best Anti-Virus engines provider
- 2019.01 [sans] Anti-virus No Thanks
- 2019.01 [sans] Antivirus is NOT Dead
- 2018.11 [stationx] New Sandbox Mode for Windows 10 Defender Antivirus: Here’s why you should pay attention…
- 2018.11 [csoonline] Best Android antivirus? The top 13 tools
- 2018.11 [antonioparata] Sacara VM Vs Antivirus Industry
- 2018.11 [minerva] How can malware authors determine whether their tools will be detected by antivirus solutions
- 2018.11 [MalwareAnalysisForHedgehogs] Why There Is No Perfect Antivirus Scanner
- 2018.10 [microsoft] Windows Defender Antivirus can now run in a sandbox
- 2018.10 [gdatasoftware] Next-Generation Antivirus: How G DATA can protect customers from unknown threats
- 2018.09 [kaspersky] Why there’s no antivirus for iOS
- 2018.07 [ensurtec] A story about “free” antivirus
- 2018.06 [csoonline] Best Android antivirus? The top 12 tools
- 2018.06 [alienvault] SMBs: 3 Signs It’s Finally Time to Replace Your AntiVirus
- 2018.06 [arxiv] [1806.04773] Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus
- 2018.06 [landave] F-Secure Anti-Virus: Remote Code Execution via Solid RAR Unpacking
- 2018.05 [360] CryptoMiner, NSASrvanyMiner, Exploits Microsoft Tool to Penetrate Antivirus
- 2018.05 [trendmicro] Operators of Counter Antivirus Service Scan4You Convicted
- 2018.05 [csoonline] Best Android antivirus? The top 11 tools
- 2018.05 [checkpoint] SiliVaccine: A Special Report Into North Korea’s Anti-Virus
- 2018.05 [checkpoint] SiliVaccine: Inside North Korea’s Anti-Virus
- 2018.04 [infosecinstitute] Configuration of Anti-Virus and Anti-Malware Software within an ICS Environment
- 2018.03 [cybereason] Fauxpersky: CredStealer malware written in AutoHotKey masquerades as Kaspersky Antivirus, spreading through infecting USB drives
- 2018.03 [Sorsnce] PowerShell Anti-Virus with VirusTotal API
- 2018.03 [microsoft] Why Windows Defender Antivirus is the most deployed in the enterprise
- 2018.03 [mikefrobbins] Remotely Uninstall ESET Antivirus with PowerShell
- 2018.01 [greyhathacker] Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege
- 2018.01 [blackhillsinfosec] Treating Antivirus as “The Gold Standard”
- 2018.01 [struppigel] Interpreting Antivirus Detection Names
- 2018.01 [cylance] Reverse Engineered Antivirus Detects Classified Documents
- 2018.01 [silentsignal] Bare Knuckled Antivirus Breaking
- 2018.01 [sans] Fake anti-virus pages popping up like weeds
- 2017.12 [securiteam] SSD Advisory – Kingsoft Antivirus/Internet Security 9+ Privilege Escalation
- 2017.12 [nettitude] An insight into antivirus testing: are you protected by your endpoint security?
- 2017.12 [microsoft] Detonating a bad rabbit: Windows Defender Antivirus and layered machine learning defenses
- 2017.12 [forensiccontrol] Is Kaspersky Anti-virus Software in Deep Trouble? – IT security matters
- 2017.12 [myonlinesecurity] Using Antivirus Software and The Risk of Abuse by Nation States
- 2017.12 [f] Antivirus in the Hot Seat, with Mikko Hypponen
- 2017.12 [f] [New Podcast] Antivirus in the Hot Seat, with Mikko Hypponen
- 2017.11 [cybereason] How new threats curb the effectiveness of antivirus and next-generation antivirus
- 2017.11 [theevilbit] Turning CVE-2017-14961 (IKARUS anti.virus local kernel exploit) into full arbitrary read / write with PALETTE objects
- 2017.11 [binarydefense] New Vulnerability Uses Antivirus Software to Inject Malware
- 2017.11 [greyhathacker] IKARUS anti.virus and its 9 exploitable kernel vulnerabilities
- 2017.11 [ensurtec] Antivirus Bug Can Be Used to Attack You
- 2017.11 [binarydefense] New Vulnerability Uses Antivirus Software to Inject Malware
- 2017.11 [greyhathacker] Exploiting Vir.IT eXplorer Anti-Virus Arbitrary Write Vulnerability
- 2017.10 [cylance] Antivirus: Understanding Why You Should Test for Yourself
- 2017.10 [securityledger] Antivirus Software is dying. What will replace it?
- 2017.10 [cybereason] Why antivirus software is becoming the rootkit you pay for
- 2017.10 [securiteam] SSD Advisory – Ikraus Anti Virus Remote Code Execution
- 2017.10 [randy] VirusTotal, Equifax, and Antimalware Products
- 2017.10 [ensurtec] How Much Do You Trust Your Antivirus Company?
- 2017.10 [stationx] Kaspersky Labs Antivirus.. Should you stop using it?
- 2017.10 [malwarejake] Should Antivirus software be part of your threat model?
- 2017.10 [NullByte] Rogue Devices: Antivirus Disabler Script on the USB Rubber Ducky
- 2017.09 [checkpoint] Does Your Mobile Anti-Virus App Protect Or Infect You? The Truth Behind DU Antivirus Security | Check Point Software Blog
- 2017.09 [checkpoint] Does Your Mobile Anti-Virus App Protect or Infect You? The Truth Behind DU Antivirus Security
- 2017.08 [deepsec] Mythbusting: Anti-Virus Research considered dangerous
- 2017.08 [ehacking] What’s the Future of Anti-Viruses, Signature Based or Real Time Anomaly Based?
- 2017.08 [ehacking] What’s the Future of Anti-Viruses, Signature Based or Real Time Anomaly Based?
- 2017.08 [asd] Antivirus Software using Reputation Rating Checking
- 2017.08 [landave] F-Secure Anti-Virus: Arbitrary Free Vulnerability via TNEF
- 2017.08 [crowdstrike] Four Steps to Choosing the Right Antivirus Replacement
- 2017.07 [DoktorCranium] Kaspersky Free Antivirus on Windows 10 vs. Metasploit
- 2017.07 [DoktorCranium] Kaspersky Free Antivirus vs. Metasploit
- 2017.07 [ringzerolabs] 2017 Best Free Antivirus Solutions from a Malware Analysts Perspective
- 2017.07 [mrg] Limitations of Android AntiVirus Scanners
- 2017.07 [microsoft] Windows Defender Antivirus cloud protection service: Advanced real-time defense against never-before-seen malware
- 2017.07 [checkpoint] SandBlast Agent Backs Up Anti-Virus by Preventing Recently Discovered Malware
- 2017.07 [malwarejake] Is antivirus software part of your threat model? Maybe it should be...
- 2017.06 [landave] Announcing a New Blog Series on Anti-Virus Software
- 2017.06 [arxiv] [1706.05779] Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices
- 2017.06 [malwarebytes] Announcing Malwarebytes Endpoint Protection, a next-generation antivirus replacement for businesses
- 2017.06 [riskiq] Thanks, But No Thanks: RiskIQ Identifies Hundreds of Malicious ‘Antivirus’ Apps, Capitalizing on Ransomware Fears and Putting Users at Risk
- 2017.05 [cylance] How Traditional Antivirus Works
- 2017.03 [welivesecurity] Cybersecurity: weighing up the value of antivirus software
- 2017.03 [esecurityplanet] Anti-Virus Solutions Fail to Protect Against Ransomware
- 2017.03 [malwarebytes] Free antivirus coupon leads to tech support scam
- 2017.02 [cylance] Antivirus Testing for Real World Failure
- 2017.02 [activecanopy] Is your organization protected with your Anti-Virus subscription?…think again.
- 2017.02 [mcafee] Large Healthcare Company Standardizes on McAfee ENS 10.5 and McAfee MOVE AntiVirus to Protect 100,000+ Physical and Virtual Endpoints
- 2017.02 [cybereason] Why next-generation antivirus requires more than building a better mousetrap
- 2017.02 [kaspersky] Count the awards: Choosing an antivirus solution
- 2017.02 [virusbulletin] The Living Dead Anti-Virus
- 2017.02 [nviso] Working with GFI Cloud anti-virus quarantine files
- 2017.01 [HackersOnBoard] DEF CON 24 - How to Do it Wrong: Smartphone Antivirus and Security Applications Under Fire
- 2017.01 [myonlinesecurity] Antivirus detections and why the initial response is so important
- 2017.01 [mikefrobbins] Using PowerShell to Audit Antivirus Updates on your Servers
- 2016.12 [malwarebytes] Announcing Malwarebytes 3.0, a next-generation antivirus replacement
- 2016.12 [heimdalsecurity] The best (free) security software to complement your antivirus
- 2016.11 [pluginvulnerabilities] CWIS Antivirus Scanner Plugin Spreading False Reports of Vulnerabilities In WordPress Plugins
- 2016.11 [virusbulletin] Throwback Thursday: The Politics of Anti-Virus
- 2016.10 [PNPtutorials] #6 - Setup || How to Install/Use ANTIVIRUS for Kali Linux ? || 1080 || HD
- 2016.10 [arxiv] [1610.06022] From Malware Signatures to Anti-Virus Assisted Attacks
- 2016.09 [checkpoint] Antivirus Isn’t Dead, But It’s No Panacea | Check Point Software Blog
- 2016.09 [talosintelligence] Kaspersky Anti-Virus Unhandled Windows Messages Denial of Service Vulnerability
- 2016.08 [malwarebytes] Unpacking the spyware disguised as antivirus
- 2016.08 [kaspersky] The evolution of reputational antivirus technologies
- 2016.08 [sophos] Sophos Home rated “Best Free Mac Antivirus” by Tom’s Guide
- 2016.07 [breakdev] Defeating Antivirus Real-time Protection From The Inside
- 2016.06 [duo] That Big Symantec Antivirus Bug
- 2016.06 [detectify] IT Security FAQ 9: What is the difference between a firewall, antivirus and services like Detectify? | Detectify Blog
- 2016.06 [seowhistleblower] Instantly Scan a File with 50+ Anti-Virus Programs! (Microsoft, McAfee, and more)
- 2016.05 [alienvault] Antivirus or Host IDS, Your Last Line of Defense
- 2016.05 [voidsec] The Curse of the Antivirus Solution
- 2016.05 [sans] CVE-2016-2208 Symantec Antivirus Engine Malformed PE Header Parser Memory Access Violation
- 2016.05 [securityevaluators] What Anti-Virus Should I Use?
- 2016.04 [trendmicro] Trend Micro Rated “Best Antivirus Software”
- 2016.04 [hackingtutorials] How does antivirus software work?
- 2016.04 [trustlook] Trustlook Antivirus & Mobile Security Android Video
- 2016.03 [trustwave] TWSL2016-003: Sophos Anti-Virus Mac OS X Version Update File Unlinking Vulnerability
- 2016.02 [myonlinesecurity] Eset antivirus and Eset Smart Security blocks Google
- 2016.01 [metaflows] Measured Antivirus Effectiveness
- 2016.01 [securityintelligence] Is Your Antivirus Software Vulnerable to Attack?
- 2016.01 [fortinet] Android Spywaller: Firewall-Style Antivirus Blocking
- 2016.01 [hackingarticles] How to Gather Information of Antivirus in Remote Victim PC using Metasploit
- 2016.01 [cyberoxen] Here’s the Best Antivirus Software for Windows 7, 8.1, and 10 PCs
- 2015.12 [malwarebytes] PUPs Masquerade as Installer for Antivirus and Anti-Adware
- 2015.11 [malwarebytes] Three Reasons Why Anti-Virus Alone is No Longer Enough
- 2015.11 [f5] Dyre Update: Moving to Edge and Windows 10 with Anti-Antivirus
- 2015.11 [welivesecurity] Schrödinger's antivirus: The immortality of antivirus software
- 2015.11 [redcanary] Does Next-Generation Anti-Virus Solve the Fatal Flaws of Anti-Virus?
- 2015.10 [sector] Is Anti-Virus Software Really Dead?
- 2015.10 [amossys] A peek inside antivirus’ cloud features
- 2015.09 [krebsonsecurity] ATM Skimmer Gang Firebombed Antivirus Firm
- 2015.09 [malwarebytes] What’s the difference between antivirus and anti-malware?
- 2015.09 [krebsonsecurity] Like Kaspersky, Russian Antivirus Firm Dr.Web Tested Rivals
- 2015.08 [securityintelligence] Dyre Summer Renovation: Randomized Config File Names Keep Antivirus Engines Guessing
- 2015.08 [virusbulletin] Back to the future: anti-virus engines and sandboxes
- 2015.08 [trendmicro] Antivirus Alone Is NOT Enough Protection for Today’s Sophisticated Threats
- 2015.07 [deepsec] New MJS Article: Why Anti-Virus Software Fails
- 2015.07 [checkpoint] ZoneAlarm Launches Windows 10 Compatible Antivirus Software for Consumers
- 2015.06 [virusbulletin] NSA, GCHQ found to target anti-virus products
- 2015.05 [securityblog] Get installed antivirus in C
- 2015.05 [360] New exploit kit targets Chinese computers without 360 antivirus
- 2015.05 [csoonline] Old-school anti-virus vendors learn new tricks
- 2015.05 [virusbulletin] Report: six anti-virus solutions pass annual Linux test
- 2015.04 [dreamsofastone] Anti-virus 1980ies style
- 2015.03 [cylance] Five Dirty Secrets of the Antivirus Industry
- 2015.03 [checkpoint] Check Point Reveals New RCE Vulnerability in BitDefender Anti-Virus | Check Point Software Blog
- 2015.03 [trustlook] Fake Antivirus Found on Google Play
- 2015.02 [metaflows] Network Antivirus White List and Minimum VT Score
- 2015.01 [welivesecurity] Do you really need antivirus software for Linux desktops?
- 2014.12 [govolution] Deepsec 2014: Why Antivirus Software fails
- 2014.11 [gironsec] assembly, c-sharp, anti-sandbox, anti-antivirus, anti-debug, and malware research
- 2014.11 [trustlook] Trustlook Antivirus & Security is back on Google Play Store!
- 2014.10 [rapid7] Noise Canceling Security: Extract More Value From IPS/IDS, Firewalls, and Anti-Virus
- 2014.10 [securityintelligence] Are You Digging Deep? When Antivirus Is Not Enough
- 2014.09 [deepsec] DeepSec 2014 Talk: Why Anti-Virus Software fails
- 2014.08 [zonealarm] Is Your PC Security Incomplete? Why You Need Both Firewall & Antivirus
- 2014.08 [zonealarm] Is Your PC Security Incomplete? Why You Need Both Firewall & Antivirus
- 2014.08 [trendmicro] Maximum Protection, Minimum Fuss: Trend Micro Titanium Antivirus+
- 2014.08 [arneswinnen] One Packer to Rule Them All: Empirical Identification, Comparison and Circumvention of Current Antivirus Detection Techniques
- 2014.07 [comodo] Vulnerabilities in Antivirus ID’d – Comodo Has the Solution
- 2014.07 [comodo] Vulnerabilities in Antivirus ID’d – Comodo Has the Solution
- 2014.06 [trendmicro] The evolving role of antivirus software
- 2014.06 [portcullis] Could Sophos Anti-Virus Web Protection cause a privacy concern for your organisation?
- 2014.05 [lastline] Antivirus Isn’t Dead, It Just Can’t Keep Up
- 2014.05 [alienvault] Antivirus is Dead, hmmm? – Surprised, We are Not
- 2014.05 [securelist] Fake antivirus – attack of the clones
- 2014.05 [sophos] Sophos news in review: Partner conferences kick off, Target CEO resigns, and is antivirus ‘dead’?
- 2014.05 [krebsonsecurity] Antivirus is Dead: Long Live Antivirus!
- 2014.04 [ethicalhackingnews] Google Refund for Fake Android Antivirus
- 2014.04 [aircrack] Anti-virus issues and open letter to Anti-virus
- 2014.04 [ethicalhackingnews] Anti-virus App Virus Shield
- 2014.04 [sophos] Sophos Antivirus for vShield and OpenSSL Vulnerability (Heartbleed)
- 2014.01 [malwarebytes] Malwarebytes Anti-Malware tops in OPSWAT Antivirus Market Share Report
- 2014.01 [robert] Bootable antivirus rescue CDs
- 2014.01 [ethicalhackingnews] Why Using Multiple Antivirus Programs is a Bad Idea
- 2014.01 [rapid7] 12 Days of HaXmas: A Cat and Mouse Game Between Exploits and Antivirus
- 2013.12 [welivesecurity] The Death of Anti-Virus: conference paper
- 2013.12 [cert] OTP stealer Android app masquerading as mobile antivirus targets Polish users
- 2013.12 [privacy] Stop Fighting Anti-Virus 4: The Cert Signing Trick
- 2013.12 [privacy] Stop Fighting Anti-Virus 3: Impetus through Embarrassment
- 2013.12 [privacy] Stop Fighting Anti-Virus 2: Pursuit of Better Protection
- 2013.12 [privacy] Stop Fighting Anti-Virus: Pentester’s Viewpoint
- 2013.12 [securelist] ZeuS – Now Packed as an Antivirus Update
- 2013.12 [malwarebytes] “Buy $500 antivirus from us,” say cyber-criminals
- 2013.11 [techhelplist] Multiple Antivirus Vendors - ... Important System Update - requires immediate action - Virus
- 2013.11 [malwarebytes] Scammers Pose as Anti-Virus, Go Figure
- 2013.10 [trendmicro] Is Free Antivirus Software Enough?
- 2013.10 [welivesecurity] Solutions to current antivirus challenges
- 2013.10 [malwarebytes] Palestinian hackers deface popular Antivirus’ websites
- 2013.09 [osandamalith] Free Antivirus by Panda Security
- 2013.08 [sans] What Anti-virus Program Is Right For You?
- 2013.07 [malwarejake] Beating up on poor antivirus...
- 2013.07 [arxiv] [1307.6354] Protecting Anti-virus Programs From Viral Attacks
- 2013.07 [arxiv] [1307.5420] How do Viruses Attack Anti-Virus Programs
- 2013.07 [krebsonsecurity] Styx Crypt Makers Push DDoS, Anti-Antivirus Services
- 2013.05 [virusbulletin] US lifts ban on anti-virus software for Iran
- 2013.04 [sans] What is "up to date anti-virus software"?
- 2013.02 [sans] Anti-virus is not enough to defeat APT groups
- 2013.02 [securityblog] Get antivirus name on Windows using C#
- 2013.01 [mcafee] If You Deploy Only Antivirus, It Will Cost You More and Make You Less Secure
- 2012.12 [privacy] VX – The Virus Underground 5: Discussing Interaction with Antivirus Companies
- 2012.12 [privacy] G Data AntiVirus review
- 2012.12 [rapid7] The Odd Couple: Metasploit and Antivirus Solutions
- 2012.12 [securiteam] Anti-Virus, now with added Michelangelo
- 2012.12 [welivesecurity] Why Anti-Virus is not a waste of money
- 2012.11 [krebsonsecurity] Infamous Hacker Heading Chinese Antivirus Firm?
- 2012.11 [cyberarms] McAfee Anti-Virus Founder – Bath Salts, Gangsters and Murder?
- 2012.11 [sans] The shortcomings of anti-virus software
- 2012.10 [virusbulletin] Anti-virus software significantly shortens life of banking trojans
- 2012.10 [cyberarms] GFI Cloud Management for Antivirus, Asset Tracking & Network Management
- 2012.09 [privacy] VIPRE Antivirus 2014 review
- 2012.08 [forcepoint] Malicious Email Messages Posing as Antivirus Notifications
- 2012.08 [rsa] The failure of Antivirus against recent Malware
- 2012.08 [sans] Do we need test procedures in our companies before implementing Antivirus signatures?
- 2012.07 [privacy] Panda Antivirus Pro 2014 review
- 2012.06 [perezbox] Review of the WordPress AntiVirus Plugin – Effective or Not?
- 2012.06 [perezbox] Selecting a MAC Anti-Virus Solution
- 2012.06 [codeinsecurity] The anti-virus age is over.
- 2012.05 [checkpoint] Check Point Launches ZoneAlarm® Free Antivirus + Firewall 2013
- 2012.04 [privacy] How malware authors are winning the war 2: exploit toolkits, fake antiviruses and mobile threats
- 2012.04 [privacy] Bitdefender Antivirus Plus 2017 review
- 2012.04 [sans] Anti-virus scanning exclusions
- 2012.04 [sans] Is Anti-Virus Really Dead? A Real-World Simulation Created for Forensic Data Yields Surprising Results
- 2012.04 [sans] Digital Forensics Case Leads: Macs do need antivirus after all and Pastebin may start cutting what hackers paste
- 2012.04 [pentestlab] Post Exploitation – Disable Firewall and Kill Antivirus
- 2012.04 [welivesecurity] Free Anti-virus: Worth Every Penny?
- 2012.03 [welivesecurity] Information Security Disconnect: RSA, USB, Antivirus, and reality
- 2012.03 [welivesecurity] Security Professionals DO use antivirus
- 2012.03 [hackingarticles] Antivirus Forensics Tools
- 2012.02 [privacy] F-Secure Anti-Virus review
- 2012.02 [privacy] PC Tools Spyware Doctor with AntiVirus review
- 2012.02 [privacy] Free Antivirus vs Paid Antivirus: Interview with Michael Gregg
- 2012.02 [sans] Problem with Microsoft Antivirus regarding malware from google website
- 2012.02 [privacy] Kaspersky Anti-Virus 2015 review
- 2012.01 [krebsonsecurity] Microsoft: Worm Operator Worked at Antivirus Firm
- 2011.11 [virusbulletin] Most free Android anti-virus 'useless', find testers
- 2011.11 [securelist] Fake Kaspersky Antivirus
- 2011.10 [deepsec] Talk: FakeAntiVirus – Journey from Trojan to a Persisent Threat
- 2011.10 [hboeck] Anti-virus applications and the Bundestrojaner
- 2011.09 [welivesecurity] RIP Anti-Virus (Again)
- 2011.08 [trendmicro] Ask Vic — In order to install Titanium Maximum, do I need to uninstall my current antivirus software?
- 2011.08 [virusbulletin] Fake codec trojan disables anti-virus software
- 2011.08 [krebsonsecurity] Fake Antivirus Industry Down, But Not Out
- 2011.08 [welivesecurity] Win32/Delf.QCZ:Trust Me, I’m Your Anti-Virus
- 2011.06 [talosintelligence] A Close Look at Rogue Antivirus Programs
- 2011.06 [sans] Harry Potter and the Rogue anti-virus: Part 1
- 2011.06 [trendmicro] How to Secure Your Mac Against Fake Antivirus Malware
- 2011.06 [sans] Some Insight into Apple's Anti-Virus Signatures
- 2011.05 [sans] More on MAC OSX Malware - MACDefender Fake Antivirus
- 2011.04 [arxiv] [1104.1070] Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey
- 2011.03 [krebsonsecurity] Rogue Antivirus Via Skype Phone Call?
- 2011.03 [krebsonsecurity] Renewal Buddy: Comparison Shopping for Anti-Virus Software
- 2011.02 [trendmicro] Firewalls, Antivirus, Antispam, Oh My!
- 2011.02 [deepsec] The Antivirus-Virus Conundrum
- 2011.01 [sans] Yet another rogue anti-virus
- 2011.01 [rapid7] Become invisible to anti-virus protection
- 2010.12 [toolswatch] Q4 2010 Antivirus, Backup Client and Windows OS Reports
- 2010.09 [securelist] The antivirus weather forecast: cloudy
- 2010.09 [securelist] Understanding Current Trends in the Fake Anti-Virus/Scareware Ecosystem
- 2010.08 [krebsonsecurity] Anti-virus Products Struggle Against Exploits
- 2010.08 [virusbulletin] A third of anti-malware products fail to secure Vista Business Edition, Virus Bulletin reveals
- 2010.08 [krebsonsecurity] Anti-virus Products Mostly Ignore Windows Security Features
- 2010.07 [krebsonsecurity] Rogue Antivirus Victims Seldom Fight Back
- 2010.07 [securelist] Anti-virus testing – to believe or not to believe
- 2010.06 [krebsonsecurity] Anti-virus is a Poor Substitute for Common Sense
- 2010.05 [welivesecurity] Test Toot Suite: Antivirus Vendors Blowing Own Horn
- 2010.05 [greyhathacker] Fake Antivirus “Security Tool” terminating new processes
- 2010.04 [krebsonsecurity] Rogue Antivirus Gangs Seize on McAfee Snafu
- 2010.04 [securelist] Rogue Anti Virus: Scaring people with Task Manager
- 2010.04 [welivesecurity] Guest Blog: How free is free Antivirus?
- 2010.04 [trendmicro] Rogue Antivirus Leads to an Adult Site
- 2010.03 [welivesecurity] Virus, Anti-Virus, Fake Anti-Virus
- 2010.03 [krebsonsecurity] Bad BitDefender Antivirus Update Hobbles Windows PCs
- 2010.03 [techorganic] Fight scareware: Learn how your anti-virus works
- 2010.03 [greyhathacker] Fake Antivirus “XP Guardian 2010” exe hijacking
- 2010.03 [trendmicro] Spammers Target Antivirus Companies
- 2010.02 [welivesecurity] NOD32 Antivirus for Mac: Some Questions
- 2009.11 [securelist] Rogue antivirus: a growing problem
- 2009.11 [talosintelligence] Paranoia and the rise of fake antivirus
- 2009.10 [securelist] The evolution of rogue antivirus
- 2009.10 [welivesecurity] Antivirus? Who Needs It?
- 2009.10 [virusbulletin] 11 out of 26 anti-virus products fail VB100 certification
- 2009.09 [sans] Fake anti-virus
- 2009.07 [trendmicro] Rogue Antivirus Terminates EXE Files
- 2009.06 [trendmicro] Air France Flight 447 Search Results Lead to Rogue Antivirus
- 2009.05 [trendmicro] Fake Antivirus Targets Brazil
- 2009.05 [sans] Is your Symantec Antivirus Alerting working correctly?
- 2009.01 [virusbulletin] Virus Bulletin announces new anti-spam certification scheme
- 2008.12 [trendmicro] Yet More Fake (And Malicious) Antivirus
- 2008.09 [sans] Fake antivirus 2009 and search engine results
- 2008.08 [trendmicro] Fake Antivirus Trojans Ramping Up
- 2008.08 [securelist] Antivirus Fraudware Goes Mobile?
- 2008.07 [sans] Is Anti-Virus Dead?
- 2008.04 [securelist] Changing threats, changing solutions: A history of viruses and antivirus
- 2008.02 [sans] Does your anti-virus detect old keyloggers?
- 2007.12 [sans] Anti-virus Control means blocking before scanning
- 2007.10 [sans] Cyber Security Awareness Tip #8: Anti-Virus, Anti-Spyware, and Other Protective Software
- 2007.09 [sans] AOL changes the free anti-virus they distribute
- 2007.07 [sans] Antivirus: The emperor is naked
- 2007.06 [pelock] Kaspersky Anti-Virus v6.0.2 vs OllyDbg
- 2007.03 [sans] Comparing Anti-Virus Solutions
- 2007.02 [sans] TrendMicro Anti-Virus vulnerability
- 2006.12 [securelist] Are all antivirus created equal?
- 2006.11 [securelist] Antivirus and Vista
- 2006.10 [trendmicro] Free Antivirus Installation… By A Trojan
- 2006.09 [sans] CA eTrust Antivirus [was] flagging lsass.e x e
- 2006.06 [securelist] And some thoughts on the anti-virus industry
- 2006.05 [sans] Critical vulnerability in Sophos Anti-Virus products
- 2006.01 [trendmicro] Anti-Virus or Pro-Virus?
- 2006.01 [securelist] No rootkit in Kaspersky Anti-Virus
- 2006.01 [sans] 2nd generation WMF exploit: status of the anti-virus products after one day.
- 2005.11 [securelist] The contemporary antivirus industry and its problems
- 2005.10 [sans] Symantec Antivirus Scan Engine: Web Service Administrative Interface Buffer Overflow
- 2005.10 [sans] Kaspersky Anti-Virus Products Remote Heap Overflow Vulnerability
- 2005.08 [infosecblog] Symantec Antivirus 9 Privilege Escalation
- 2005.05 [sans] Google Web Accelerator continued; phpBB 2.0.15 released; Backdoors more popular than Viruses?; Anti-Spyware poll results; Google.com DNS glitch; SQL server 2000 SP4
- 2005.04 [securelist] Kaspersky Anti-Virus Web Scanner
- 2005.02 [securelist] Spammers hide from antivirus vendors
- 2004.11 [sans] An anti-virus goof; security awareness; and a return visit from some old friends; phishers, and sasser
- 2004.11 [sans] MS Security Alert Advanced Notice, Cisco PIX Source Code Reported Stolen, Open Letter to Anti-Virus Software Companies
- 2004.10 [securelist] The changing antivirus landscape
- 2004.10 [securelist] Antivirus updating – why it’s more important than ever before
- 2004.10 [securelist] Traditional antivirus solutions – are they effective against today’s threats?
- 2004.02 [sans] Flaws in Checkpoint and RealOne; MyDoom Update; AntiVirus Software; Data Call
- 2004.01 [sans] Microsoft patches released; H.323 vulnerabilities; Anti-virus engine vulnerabilities; Citibank anti-fraud measures
- 2009.08 [pediy] code:PspTerminateProcess杀进程
- 2005.12 [pediy] 一个简单的自杀代码
- 2019.10 [HackersOnBoard] Black Hat USA 2016 AVLeak Fingerprinting Antivirus Emulators for Advanced Malware Evasion
- 2019.06 [arxiv] [1906.10625] Antiforensic techniques deployed by custom developed malware in evading anti-virus detection
- 2018.03 [ensilo] AV-TEST Verifies that the Next Generation Antivirus Features of the enSilo Endpoint Security Platform Deliver 100% Pre-Infection Malware Protection
- 2018.02 [heimdalsecurity] Security Alert: Hancitor Trojan Downloader Evades AV Detection, Drops Malware Cocktail
- 2017.11 [securityintelligence] Overlay RAT Malware Uses AutoIt Scripting to Bypass Antivirus Detection
- 2016.10 [emsisoft] Emsisoft Anti-Malware earns Advanced+ rating in AV-Comparatives Performance Test
- 2016.10 [emsisoft] Emsisoft Anti-Malware rated top performer in AV-Comparatives Scanner Test
- 2015.07 [paloaltonetworks] New Android Malware Family Evades Antivirus Detection by Using Popular Ad
- 2015.04 [bogner] How Malware Evades Antivirus Detection
- 2015.04 [duo] Banking Malware Targets Wire Transfers; Evades Antivirus
- 2015.02 [lastline] Carbanak Malware — Ninety Five Percent Exhibits Stealthy or Evasive Behaviors
- 2014.07 [malwarebytes] Malwarebytes Anti-Malware Free scores 100% in AV-TEST removal test!
- 2014.04 [emsisoft] Emsisoft Anti-Malware Scores Advanced+ Rating in AV-Comparatives File Detection Test
- 2010.05 [sans] Malware modularization and AV detection evasion
- 2010.05 [elearnsecurity] Malware can bypass all Windows based AV’s
Contents auto exported by Our System, please raise Issue if you have any question.