La entrega de este producto debe hacerla mediante una presentacion de Power Point, que debe alojarla en Google Drive y enviar el enlace para compartirla al siguiente correo con Marketingcidec.producto@blogger.com para que se proceda al proceso de evaluacion. Envie el correo bien identificado, colocando el vinculo para que se pueda ingresar al mismo, tal como se indica en la siguiente figura

producto final

producto final
Ejemplo del mensaje para enviar el producto

sábado, 6 de junio de 2020

Ask And You Shall Receive



I get emails from readers asking for specific malware samples and thought I would make a mini post about it.

Yes, I often obtain samples from various sources for my own research.

 I am sometimes too lazy/busy to post them but don't mind sharing.
If you are looking for a particular sample, feel free to ask. I might have it.

Send MD5 (several or few samples). I cannot provide hundreds/thousands of samples or any kind of feeds. If you ask for a particular family, I might be able to help if I already have it.

Unfortunately, I do not have time to do homework for students and provide very specific sets for malware with specific features as well as guarantee the C2s are still active.  Send your MD5(s) or at least malware family and I check if I have it :) If i have it, I will either send you or will post on the blog where you can download.

If you emailed me in the past and never got an answer, please remind me. Sometimes emails are long with many questions and I flag them to reply to later, when I have time and they get buried or I forget. It does not happen very often but accept my apologies if it happened to you.

Before you ask, check if it is already available via Contagio or Contagio Mobile.
1. Search the blog using the search box on the right side
2. Search here https://www.mediafire.com/folder/b8xxm22zrrqm4/BADINFECT
3. Search here https://www.mediafire.com/folder/c2az029ch6cke/TRAFFIC_PATTERNS_COLLECTION
4. Search here https://www.mediafire.com/folder/78npy8h7h0g9y/MOBILEMALWARE

Cheers,  Mila

More info


  1. Hacking Language
  2. How To Pentest A Network
  3. Pentest Software
  4. Hacking Hardware
  5. Pentest Basics
  6. Pentest Environment
  7. Hacking Link
  8. Hacker Ethic
  9. Hacking Jailbreak
  10. Hacking Hardware
  11. Hacking Typer
  12. Pentest Documentation
  13. Pentest Framework
  14. Pentest Basics
  15. Hacker News
  16. Pentest Tools Framework

No hay comentarios.:

Publicar un comentario