<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[الفريق العربي للهندسة العكسية - مختبر الفايروسات - Virus & Malware Labs]]></title>
		<link>https://www.at4re.net/f/</link>
		<description><![CDATA[الفريق العربي للهندسة العكسية - https://www.at4re.net/f]]></description>
		<pubDate>Sat, 25 Apr 2026 03:12:25 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[إزالة فيروس Win64/Expiro الخطير]]></title>
			<link>https://www.at4re.net/f/thread-5018.html</link>
			<pubDate>Fri, 23 Jan 2026 08:06:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6554">mohameddz77</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5018.html</guid>
			<description><![CDATA[<span style="color: #c0392b;" class="mycode_color"><span style="font-size: xx-large;" class="mycode_size"><span style="font-family: Times New Roman,Times,serif;" class="mycode_font"><span style="font-style: italic;" class="mycode_i"><span style="font-weight: bold;" class="mycode_b">هذا اخطر فيروس واجهته اسمه Win64/Expiro و ياتي من مواقع الكراكرز الصينية مهما كان عندك مضاد حماية<br />
                            فسيدمر جهاز<br />
اريد من اهل الاختصاص افادتنا بطريقة لمنع انتشاره و اكتشافه.</span></span></span></span></span>]]></description>
			<content:encoded><![CDATA[<span style="color: #c0392b;" class="mycode_color"><span style="font-size: xx-large;" class="mycode_size"><span style="font-family: Times New Roman,Times,serif;" class="mycode_font"><span style="font-style: italic;" class="mycode_i"><span style="font-weight: bold;" class="mycode_b">هذا اخطر فيروس واجهته اسمه Win64/Expiro و ياتي من مواقع الكراكرز الصينية مهما كان عندك مضاد حماية<br />
                            فسيدمر جهاز<br />
اريد من اهل الاختصاص افادتنا بطريقة لمنع انتشاره و اكتشافه.</span></span></span></span></span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[windows fiber api]]></title>
			<link>https://www.at4re.net/f/thread-4684.html</link>
			<pubDate>Sun, 03 Aug 2025 12:07:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6198">0xFrPr</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4684.html</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://www.at4re.net/f/images/smilies/Salam.gif" alt="Salam" title="Salam" class="smilie smilie_72" /></div>
شرح بسيط عن تقنية الfibers التي تستخدمها بعض الMalwares<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3280" target="_blank" title="">Link.txt</a> (الحجم : 26 bytes / التحميلات : 4)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://www.at4re.net/f/images/smilies/Salam.gif" alt="Salam" title="Salam" class="smilie smilie_72" /></div>
شرح بسيط عن تقنية الfibers التي تستخدمها بعض الMalwares<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3280" target="_blank" title="">Link.txt</a> (الحجم : 26 bytes / التحميلات : 4)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[IAT Camouflage]]></title>
			<link>https://www.at4re.net/f/thread-4658.html</link>
			<pubDate>Sat, 19 Jul 2025 12:29:14 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6198">0xFrPr</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4658.html</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://www.at4re.net/f/images/smilies/Salam.gif" alt="Salam" title="Salam" class="smilie smilie_72" /></div>
<div style="text-align: right;" class="mycode_align">في هذا الشرح تم التطرق لموضوع MSCRT وايضا تم شرح تقنية IAT Camouflage والتي تستخدمها بعض الMalwares لخداع المحللين  <img src="https://www.at4re.net/f/images/smilies/XD2.gif" alt="XD2" title="XD2" class="smilie smilie_71" /><br />
رابط تحميل الشرح في المرفقات .</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3260" target="_blank" title="">Link.txt</a> (الحجم : 26 bytes / التحميلات : 5)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://www.at4re.net/f/images/smilies/Salam.gif" alt="Salam" title="Salam" class="smilie smilie_72" /></div>
<div style="text-align: right;" class="mycode_align">في هذا الشرح تم التطرق لموضوع MSCRT وايضا تم شرح تقنية IAT Camouflage والتي تستخدمها بعض الMalwares لخداع المحللين  <img src="https://www.at4re.net/f/images/smilies/XD2.gif" alt="XD2" title="XD2" class="smilie smilie_71" /><br />
رابط تحميل الشرح في المرفقات .</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3260" target="_blank" title="">Link.txt</a> (الحجم : 26 bytes / التحميلات : 5)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Process Hypnosis]]></title>
			<link>https://www.at4re.net/f/thread-4639.html</link>
			<pubDate>Thu, 10 Jul 2025 20:40:35 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6198">0xFrPr</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4639.html</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://www.at4re.net/f/images/smilies/Salam.gif" alt="Salam" title="Salam" class="smilie smilie_72" /><br />
</div>
شرح لتقنية الـProcess Hypnosis وهي أحد أساليب الحقن المتقدمة .<br />
الشرح إهداء للأخ TeRco<br />
<br />
رابط الشرح :<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3247" target="_blank" title="">link.txt</a> (الحجم : 28 bytes / التحميلات : 1)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://www.at4re.net/f/images/smilies/Salam.gif" alt="Salam" title="Salam" class="smilie smilie_72" /><br />
</div>
شرح لتقنية الـProcess Hypnosis وهي أحد أساليب الحقن المتقدمة .<br />
الشرح إهداء للأخ TeRco<br />
<br />
رابط الشرح :<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3247" target="_blank" title="">link.txt</a> (الحجم : 28 bytes / التحميلات : 1)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Process Injection]]></title>
			<link>https://www.at4re.net/f/thread-4630.html</link>
			<pubDate>Sun, 06 Jul 2025 11:15:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6198">0xFrPr</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4630.html</guid>
			<description><![CDATA[بسم الله الرحمن الرحيم <br />
<br />
هذا شرح لي عن احد تقنيات الحقن التي تستخدمها بعض  الMalware<br />
لقد تم تطبيق الحقن للفائدة ومعرفة كيف يتم ذلك وماهي الwin api التي يتم استخدامها في هذا النوع<br />
<br />
<a href="https://gofile.io/d/lXsOZe" target="_blank" rel="noopener" class="mycode_url">https://gofile.io/d/lXsOZe</a>]]></description>
			<content:encoded><![CDATA[بسم الله الرحمن الرحيم <br />
<br />
هذا شرح لي عن احد تقنيات الحقن التي تستخدمها بعض  الMalware<br />
لقد تم تطبيق الحقن للفائدة ومعرفة كيف يتم ذلك وماهي الwin api التي يتم استخدامها في هذا النوع<br />
<br />
<a href="https://gofile.io/d/lXsOZe" target="_blank" rel="noopener" class="mycode_url">https://gofile.io/d/lXsOZe</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[javascript malware : RETEFE]]></title>
			<link>https://www.at4re.net/f/thread-3970.html</link>
			<pubDate>Tue, 14 May 2024 12:48:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=112">H@rd.net</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3970.html</guid>
			<description><![CDATA[السلام عليكم ورحمت الله وبركاته<br />
<br />
برنامج ضار شرس للاتحليل ...<br />
تحليلا ممتعا.<br />
<br />
 <br />
<blockquote class="mycode_quote"><cite>إقتباس :</cite>Retefe Banking Malware Starts Leveraging EternalBlue</blockquote>
<blockquote class="mycode_quote"><cite>إقتباس :</cite><div style="text-align: left;" class="mycode_align">28 de septiembre de 2017<br />
A recent upgrade in the propagation capabilities of the Retefe banking Trojan (detected by Trend Micro as TROJ_RETEFE.ASUAN), as well as a few other developments in the banking malware landscape this month, shows how malware developers are ramping up their operations.</div>
<div style="text-align: left;" class="mycode_align">A recent report details how the developers behind Retefe added a new functionality to the malware that leverages EternalBlue (addressed by MS17-010), an infamous exploit connected to WannaCry and Petya ransomware attacks. Retefe is not the first banking Trojan to upgrade its propagation techniques—TrickBot and Emotet also took inspiration from the WannaCry and Petya outbreaks.</div>
<div style="text-align: left;" class="mycode_align">Security researchers noted that this new spate of Retefe campaigns has been spreading across different regions over the past few months. Typically this malware targets users in Austria, Sweden, Switzerland, Japan and recently the United Kingdom. The malware is distributed by malicious emails with “.lnk” shortcuts. If the attachment is opened and permission is given, a PowerShell command is triggered to download a self-extracting archive hosted on a remote server. Within the archive is an obfuscated JavaScript installer that implements the EternalBlue exploit, Eternal Blue then downloads a PowerShell script which installs Retefe. Most other banking Trojans use fake login pages on top of legitimate sites to steal credentials, but Retefe works by modifying the computer’s proxy settings and redirecting traffic to malicious sites hosted on remote servers.</div>
<div style="text-align: left;" class="mycode_align">Reports note that on September 20, the implementation of EternalBlue was modified and the module responsible for lateral spreading was removed, “thus avoiding an infinite spreading loop”.</div>
This month’s banking malware landscape<br />
<div style="text-align: left;" class="mycode_align">Early this month, a new banking Trojan called Red Alert 2.0 was also ramping up operations and spreading through third-party app stores. This particular malware targets banking and social apps. Once installed, it uses an overlay to steal user credentials that it passes to a remote server. Red Alert 2.0 also blocks incoming calls from banks, presumably to block verification attempts and notifications.</div>
<div style="text-align: left;" class="mycode_align">This month also saw the BankBot malware updated. This malware is quite similar to Red Alert: it uses fake overlay screens to steal user credentials and is also capable of hijacking and intercepting SMS messages. Another consequence is that the malware can bypass SMS-based 2-factor authentication. The newer BankBot targets legitimate apps from banks based in 27 different countries, and ten United Arab Emirates (UAE) banking apps were added to their list.</div>
<div style="text-align: left;" class="mycode_align">Cybercriminals are constantly developing and adding functionality to their malware, and users should be equally vigilant. EternalBlue is a known exploit, and a patch has been available since March 2017. Users can stay protected by keeping their operating systems updated and using multilayered solutions.</div>
<div style="text-align: left;" class="mycode_align">Email and web gateway solutions such as Trend Micro™ Deep Discovery™ Email Inspector and InterScan™ Web Security can prevent malware from ever reaching end users. At the endpoint level, Trend Micro Smart Protection Suites deliver several capabilities like high fidelity machine learning, web reputation services, behavior monitoring, and application control, and vulnerability shielding that minimize the impact of this threat. Trend Micro Endpoint Sensor will also be effective in monitoring processes or events that trigger malicious activity.</div>
<div style="text-align: left;" class="mycode_align">Trend Micro™ Deep Discovery™ Inspector can detect connections to malicious C&amp;C and help quickly identify the impacted machines on networks, while Trend Micro™ Deep Security™ can stop MS17-010 exploits from the network through its IPS technology.</div>
<div style="text-align: left;" class="mycode_align">For small businesses, Trend Micro Worry-Free Services Advanced offers cloud-based email gateway security through Hosted Email Security. Its endpoint protection also delivers several capabilities such as behavior monitoring and real-time web reputation in order detect and block ransomware.</div>
<div style="text-align: left;" class="mycode_align">All solutions are powered by XGen™ endpoint security, which infuses high-fidelity machine learning with other detection technologies and global threat intelligence for comprehensive protection against advanced malware.</div>
<div style="text-align: left;" class="mycode_align">Publicado en Cybercrime &amp; Digital Threats, Trojan</div></blockquote>
<div style="text-align: left;" class="mycode_align">SOURCE</div>
<blockquote class="mycode_quote"><cite>إقتباس :</cite><div style="text-align: left;" class="mycode_align">trendmicro.com/vinfo/es/security/news/cybercrime-and-digital-threats/retefe-banking-malware-starts-leveraging-eternalblue</div></blockquote>
<div style="text-align: left;" class="mycode_align">
DOWNLOAD</div>
<blockquote class="mycode_quote"><cite>إقتباس :</cite><div style="text-align: left;" class="mycode_align">malshare.com/sample.php?action=detail&amp;hash=9b8771374f02f0357e23b312b6793a86 </div></blockquote>
]]></description>
			<content:encoded><![CDATA[السلام عليكم ورحمت الله وبركاته<br />
<br />
برنامج ضار شرس للاتحليل ...<br />
تحليلا ممتعا.<br />
<br />
 <br />
<blockquote class="mycode_quote"><cite>إقتباس :</cite>Retefe Banking Malware Starts Leveraging EternalBlue</blockquote>
<blockquote class="mycode_quote"><cite>إقتباس :</cite><div style="text-align: left;" class="mycode_align">28 de septiembre de 2017<br />
A recent upgrade in the propagation capabilities of the Retefe banking Trojan (detected by Trend Micro as TROJ_RETEFE.ASUAN), as well as a few other developments in the banking malware landscape this month, shows how malware developers are ramping up their operations.</div>
<div style="text-align: left;" class="mycode_align">A recent report details how the developers behind Retefe added a new functionality to the malware that leverages EternalBlue (addressed by MS17-010), an infamous exploit connected to WannaCry and Petya ransomware attacks. Retefe is not the first banking Trojan to upgrade its propagation techniques—TrickBot and Emotet also took inspiration from the WannaCry and Petya outbreaks.</div>
<div style="text-align: left;" class="mycode_align">Security researchers noted that this new spate of Retefe campaigns has been spreading across different regions over the past few months. Typically this malware targets users in Austria, Sweden, Switzerland, Japan and recently the United Kingdom. The malware is distributed by malicious emails with “.lnk” shortcuts. If the attachment is opened and permission is given, a PowerShell command is triggered to download a self-extracting archive hosted on a remote server. Within the archive is an obfuscated JavaScript installer that implements the EternalBlue exploit, Eternal Blue then downloads a PowerShell script which installs Retefe. Most other banking Trojans use fake login pages on top of legitimate sites to steal credentials, but Retefe works by modifying the computer’s proxy settings and redirecting traffic to malicious sites hosted on remote servers.</div>
<div style="text-align: left;" class="mycode_align">Reports note that on September 20, the implementation of EternalBlue was modified and the module responsible for lateral spreading was removed, “thus avoiding an infinite spreading loop”.</div>
This month’s banking malware landscape<br />
<div style="text-align: left;" class="mycode_align">Early this month, a new banking Trojan called Red Alert 2.0 was also ramping up operations and spreading through third-party app stores. This particular malware targets banking and social apps. Once installed, it uses an overlay to steal user credentials that it passes to a remote server. Red Alert 2.0 also blocks incoming calls from banks, presumably to block verification attempts and notifications.</div>
<div style="text-align: left;" class="mycode_align">This month also saw the BankBot malware updated. This malware is quite similar to Red Alert: it uses fake overlay screens to steal user credentials and is also capable of hijacking and intercepting SMS messages. Another consequence is that the malware can bypass SMS-based 2-factor authentication. The newer BankBot targets legitimate apps from banks based in 27 different countries, and ten United Arab Emirates (UAE) banking apps were added to their list.</div>
<div style="text-align: left;" class="mycode_align">Cybercriminals are constantly developing and adding functionality to their malware, and users should be equally vigilant. EternalBlue is a known exploit, and a patch has been available since March 2017. Users can stay protected by keeping their operating systems updated and using multilayered solutions.</div>
<div style="text-align: left;" class="mycode_align">Email and web gateway solutions such as Trend Micro™ Deep Discovery™ Email Inspector and InterScan™ Web Security can prevent malware from ever reaching end users. At the endpoint level, Trend Micro Smart Protection Suites deliver several capabilities like high fidelity machine learning, web reputation services, behavior monitoring, and application control, and vulnerability shielding that minimize the impact of this threat. Trend Micro Endpoint Sensor will also be effective in monitoring processes or events that trigger malicious activity.</div>
<div style="text-align: left;" class="mycode_align">Trend Micro™ Deep Discovery™ Inspector can detect connections to malicious C&amp;C and help quickly identify the impacted machines on networks, while Trend Micro™ Deep Security™ can stop MS17-010 exploits from the network through its IPS technology.</div>
<div style="text-align: left;" class="mycode_align">For small businesses, Trend Micro Worry-Free Services Advanced offers cloud-based email gateway security through Hosted Email Security. Its endpoint protection also delivers several capabilities such as behavior monitoring and real-time web reputation in order detect and block ransomware.</div>
<div style="text-align: left;" class="mycode_align">All solutions are powered by XGen™ endpoint security, which infuses high-fidelity machine learning with other detection technologies and global threat intelligence for comprehensive protection against advanced malware.</div>
<div style="text-align: left;" class="mycode_align">Publicado en Cybercrime &amp; Digital Threats, Trojan</div></blockquote>
<div style="text-align: left;" class="mycode_align">SOURCE</div>
<blockquote class="mycode_quote"><cite>إقتباس :</cite><div style="text-align: left;" class="mycode_align">trendmicro.com/vinfo/es/security/news/cybercrime-and-digital-threats/retefe-banking-malware-starts-leveraging-eternalblue</div></blockquote>
<div style="text-align: left;" class="mycode_align">
DOWNLOAD</div>
<blockquote class="mycode_quote"><cite>إقتباس :</cite><div style="text-align: left;" class="mycode_align">malshare.com/sample.php?action=detail&amp;hash=9b8771374f02f0357e23b312b6793a86 </div></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[هل ultrasurf أمن للأستخدام؟]]></title>
			<link>https://www.at4re.net/f/thread-3949.html</link>
			<pubDate>Sat, 11 May 2024 19:21:21 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=3325">H@wk0</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3949.html</guid>
			<description><![CDATA[هل يعتبر برنامج ultrasurf آمن للأستخدام خاصةً أنه مجاني بشكل كامل و بدون مقابل<br />
<br />
حيث أن نتائج فحصه على موقع Virus Total غير مطمئنة<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://www.virustotal.com/gui/file/168e625c7eb51720f5ce1922aec6ad316b3aaca838bd864ee2bcdbd9b66171d0
</code></pre><br />
هل هنالك اي شخص عانى من مشكلة مع هذا البرنامج؟]]></description>
			<content:encoded><![CDATA[هل يعتبر برنامج ultrasurf آمن للأستخدام خاصةً أنه مجاني بشكل كامل و بدون مقابل<br />
<br />
حيث أن نتائج فحصه على موقع Virus Total غير مطمئنة<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://www.virustotal.com/gui/file/168e625c7eb51720f5ce1922aec6ad316b3aaca838bd864ee2bcdbd9b66171d0
</code></pre><br />
هل هنالك اي شخص عانى من مشكلة مع هذا البرنامج؟]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[أكبر قاعدة ضخمة للفيروسات]]></title>
			<link>https://www.at4re.net/f/thread-3805.html</link>
			<pubDate>Mon, 08 Apr 2024 05:57:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=4820">amrouchk</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3805.html</guid>
			<description><![CDATA[موقع يقدم لك أكبر قاعدة بيانات ضخم<br />
يحتوي الموقع حاليا على 78,809,256 عينة من البرامج الضارة و الفيروسات..<br />
لتحميل الملفات يجب عليك إرسال إيميل لإدارة الموقع مع  التأكيد على شرح الغرض من استعمالك للفيروسات،<br />
ثم يتم تقديم عضوية دائمة لك<br />
إليكم الموقع:<br />
<pre class="block-code line-numbers"><code class="language-php">https://virusshare.com/
</code></pre>]]></description>
			<content:encoded><![CDATA[موقع يقدم لك أكبر قاعدة بيانات ضخم<br />
يحتوي الموقع حاليا على 78,809,256 عينة من البرامج الضارة و الفيروسات..<br />
لتحميل الملفات يجب عليك إرسال إيميل لإدارة الموقع مع  التأكيد على شرح الغرض من استعمالك للفيروسات،<br />
ثم يتم تقديم عضوية دائمة لك<br />
إليكم الموقع:<br />
<pre class="block-code line-numbers"><code class="language-php">https://virusshare.com/
</code></pre>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[YARA - The pattern matching swiss knife for malware researchers]]></title>
			<link>https://www.at4re.net/f/thread-3742.html</link>
			<pubDate>Mon, 05 Feb 2024 19:09:14 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=3325">H@wk0</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3742.html</guid>
			<description><![CDATA[<div style="text-align: left;" class="mycode_align"> </div>
<div style="text-align: left;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">  YARA - The pattern matching swiss knife for malware researchers</span><br />
<br />
YARA is a tool used for identifying and classifying malware. It allows users to create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns, and then search for these patterns in files or processes. This makes it a valuable tool for malware researchers and analysts.<br />
<br />
To know more about it you can visit the official project website:<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://virustotal.github.io/yara/
</code></pre><br />
The github website:<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://github.com/virustotal/yara
</code></pre><br />
<br />
</div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: left;" class="mycode_align"> </div>
<div style="text-align: left;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">  YARA - The pattern matching swiss knife for malware researchers</span><br />
<br />
YARA is a tool used for identifying and classifying malware. It allows users to create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns, and then search for these patterns in files or processes. This makes it a valuable tool for malware researchers and analysts.<br />
<br />
To know more about it you can visit the official project website:<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://virustotal.github.io/yara/
</code></pre><br />
The github website:<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://github.com/virustotal/yara
</code></pre><br />
<br />
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Malware Analysis Series (MAS)]]></title>
			<link>https://www.at4re.net/f/thread-3685.html</link>
			<pubDate>Sat, 28 Oct 2023 19:26:33 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=3325">H@wk0</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3685.html</guid>
			<description><![CDATA[سلسة مميزة لتعلم تحليل الـ Malware:<br />
<div style="text-align: left;" class="mycode_align">
 <a href="https://www.mediafire.com/file/8f040h9boeb6h7q/mas_1.pdf/file" target="_blank" rel="noopener" class="mycode_url">https://www.mediafire.com/file/8f040h9bo...1.pdf/file</a><br />
<a href="https://www.mediafire.com/file/po7mt203qhsg6ca/mas_2.pdf/file" target="_blank" rel="noopener" class="mycode_url">https://www.mediafire.com/file/po7mt203qhsg6ca/mas_2.pdf/file<br />
https://www.mediafire.com/file/6dqzljkdtbyuv6d/mas_3.pdf/file<br />
https://www.mediafire.com/file/lez61redb3va96i/mas_4.pdf/file<br />
https://www.mediafire.com/file/9pi1toqyk6mcltn/mas_5.pdf/file<br />
https://www.mediafire.com/file/xnis9edr7hvxikw/mas_6.pdf/file</a></div>]]></description>
			<content:encoded><![CDATA[سلسة مميزة لتعلم تحليل الـ Malware:<br />
<div style="text-align: left;" class="mycode_align">
 <a href="https://www.mediafire.com/file/8f040h9boeb6h7q/mas_1.pdf/file" target="_blank" rel="noopener" class="mycode_url">https://www.mediafire.com/file/8f040h9bo...1.pdf/file</a><br />
<a href="https://www.mediafire.com/file/po7mt203qhsg6ca/mas_2.pdf/file" target="_blank" rel="noopener" class="mycode_url">https://www.mediafire.com/file/po7mt203qhsg6ca/mas_2.pdf/file<br />
https://www.mediafire.com/file/6dqzljkdtbyuv6d/mas_3.pdf/file<br />
https://www.mediafire.com/file/lez61redb3va96i/mas_4.pdf/file<br />
https://www.mediafire.com/file/9pi1toqyk6mcltn/mas_5.pdf/file<br />
https://www.mediafire.com/file/xnis9edr7hvxikw/mas_6.pdf/file</a></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[فيرس الفدية]]></title>
			<link>https://www.at4re.net/f/thread-3577.html</link>
			<pubDate>Thu, 20 Apr 2023 21:27:44 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=76">mammt</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3577.html</guid>
			<description><![CDATA[السلام عليكم <br />
اصيب جهازى بفيرس الفدية وتم تشفير كل ملفاتى .ااثناء  تسطيب احد البرامج من على النت<br />
ثم نزلت الفيروس مرة اخرى . هل من الممكن عن طريق برنامج اx32dbg. احصل على مفتاح التشفير علما بان عن فتح الفيروس عن طريق برنامج x32dbg تظهر رسالة A debugger has been found running in your system.\nPlease, unload it from memory and restart your program<br />
ام الوضوع صعب ؟]]></description>
			<content:encoded><![CDATA[السلام عليكم <br />
اصيب جهازى بفيرس الفدية وتم تشفير كل ملفاتى .ااثناء  تسطيب احد البرامج من على النت<br />
ثم نزلت الفيروس مرة اخرى . هل من الممكن عن طريق برنامج اx32dbg. احصل على مفتاح التشفير علما بان عن فتح الفيروس عن طريق برنامج x32dbg تظهر رسالة A debugger has been found running in your system.\nPlease, unload it from memory and restart your program<br />
ام الوضوع صعب ؟]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Practical Malware Analysis, a complete starter kit]]></title>
			<link>https://www.at4re.net/f/thread-3367.html</link>
			<pubDate>Sat, 15 Oct 2022 20:37:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=3325">H@wk0</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3367.html</guid>
			<description><![CDATA[أي شخص يرغب في فحص برامج الـ Malware بحاجه لعدد من الأدوات المناسبه للمهمه و الرابط التالي تتوفر فيه أهم هذه الأدوات:<br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">https://bluesoul.me/files/PMAStarterKit.zip
</code></pre><br />
كلمه السر هي: <span style="font-weight: bold;" class="mycode_b">malware</span><br />
<br />
قائمه الأدوات تشمل التالي:<br />
 <ul class="mycode_list"><li>MD5DEEP 4.4 and related tools (sha1deep, hashdeep, whirlpooldeep, etc) and 64-bit equivalents.<br />
</li>
<li>WinMD5Free v1.20<br />
</li>
<li>PEiD v0.95 with KANAL plugin<br />
</li>
<li>Strings v2.52<br />
</li>
<li>upx 3.91<br />
</li>
<li>PEview v0.9.9<br />
</li>
<li>Resource Hacker v4.2.5<br />
</li>
<li>PEBrowse Professional v10.1.4<br />
</li>
<li>PEBrowse64 Professional v6.3.1<br />
</li>
<li>PE Explorer 1.99 R6 (Trial)<br />
</li>
<li>Process Monitor (procmon) v3.2<br />
</li>
<li>Process Explorer (procexp) v16.10<br />
</li>
<li>Regshot v1.9.0<br />
</li>
<li>ApateDNS v1.0<br />
</li>
<li>Netcat (nc) 1.11 and 64-bit build<br />
</li>
<li>Wireshark v2.0.3<br />
</li>
<li>FakeNet 1.0c (INetSim alternative for Windows)<br />
</li>
<li>Combined Volume Set of Intel® 64 and IA-32 Architectures Software Developer’s Manuals<br />
</li>
<li>IDA Pro Free v5.0 with FindCrypt plugin, IDA Entropy Plugin<br />
</li>
<li>Autoruns v13.51 and autorunsc<br />
</li>
<li>OllyDbg v1.10 and v2.01d<br />
</li>
<li>OllyDump Plugin<br />
</li>
<li>WinDbg x86 and x64 v6.11.1.404<br />
</li>
<li>Immunity Debugger (ImmDbg) v1.85<br />
</li>
<li>SoftICE 4.05 for w98 and NT/XP (SEE FOOTER)<br />
</li>
<li>SoftIceNT 4.2.7 (from 2.7 Driver Studio build) for XP (SEE FOOTER)<br />
</li>
<li>OSR Driver Loader v3.0<br />
</li>
<li>Poison Ivy RAT 2.3.2 (Password is “malware” with no quotes, if the exe is eaten by your AV)<br />
</li>
<li>pwdump6 (as PwDump.exe)<br />
</li>
<li>pwdump7<br />
</li>
<li>Pass-The-Hash Toolkit v1.4<br />
</li>
<li>Metasploit Framework v4.11.7<br />
</li>
<li>PyCrypto (Requires Python 2.7)<br />
</li>
<li>Snort 2.9.8.2<br />
</li>
<li>ScoopyNG v1.0<br />
</li>
<li>Mandiant Red Curtain 1.0<br />
</li>
<li>ASPack 2.39 (Trial)<br />
</li>
<li>PETite v2.4<br />
</li>
<li>WinUPack v0.39 Final<br />
</li>
<li>Themida 2.4.1.0 (Trial)<br />
</li>
<li>shellcode_launcher.exe (Gone from practicalmalwareanalysis.com)<br />
</li>
<li>Bochs 2.6.8<br />
</li>
<li>Burp Suite 1.7.03<br />
</li>
<li>CaptureBAT 2.0.0–5574<br />
</li>
<li>Cuckoo 2.0-RC1 (Requires Python)<br />
</li>
<li>CFF Explorer (As Explorer Suite 4)<br />
</li>
<li>WinHex 18.8.0.0<br />
</li>
<li>Import REConstructor (ImpREC) 1.7e<br />
</li>
<li>LordPE 1.41 Deluxe<br />
</li>
<li>Malcode Analyst Pack<br />
</li>
<li>Memoryze 3.0<br />
</li>
<li>OfficeMalScanner 0.5<br />
</li>
<li>Zynamics BinDiff 4.20 (Key provided by Zynamics)<br />
</li>
<li>pdfid.py and pdf-parser.py (Requires Python, obviously)<br />
</li>
<li>Sandboxie v5.10<br />
</li>
<li>Buster Sandbox Analyzer v1.88 Update 4<br />
</li>
<li>TCPView v3.05<br />
</li>
<li>The Sleuth Kit 4.2.0 for Windows<br />
</li>
<li>VERA v0.3<br />
</li>
<li>Volatility 2.5<br />
</li>
<li>Yara v1.7.1 x86 and x64<br />
</li>
</ul>
<div style="text-align: right;" class="mycode_align"> </div>
تحذير:<br />
يرجى توخي الحذر الشديد. توجد عينات أكواد برمجية ضارة متوفرة في الجزء الخاص بالـ Lab و بعضها هي برامج ضاره حقيقيه مرتبطه بـ سيرفات C2. و يفضل أستخدام نسخه ويندوز وهميه لحمايه نظامك الأساسي.<br />
<br />
<br />
هذه الأدوات مستخدمه في الكتاب:<br />
 <br />
<div style="text-align: left;" class="mycode_align">Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software - 1st Edition </div>
<br />
و رابط الكتاب على موقع أمازون هو:<br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901
</code></pre> Topics covered are the following:<ul class="mycode_list"><li>Set up a safe virtual environment to analyze malware<br />
</li>
<li>Quickly extract network signatures and host-based indicators<br />
</li>
<li>Use key analysis tools like IDA Pro, OllyDbg, and WinDbg<br />
</li>
<li>Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques<br />
</li>
<li>Use your newfound knowledge of Windows internals for malware analysis<br />
</li>
<li>Develop a methodology for unpacking malware and get practical experience with five of the most popular packers<br />
</li>
<li>Analyze special cases of malware with shellcode, C++, and 64-bit code<br />
</li>
</ul>
و هو كتاب هام لمن يرغب بالعمل في مجال الأمن السبراني]]></description>
			<content:encoded><![CDATA[أي شخص يرغب في فحص برامج الـ Malware بحاجه لعدد من الأدوات المناسبه للمهمه و الرابط التالي تتوفر فيه أهم هذه الأدوات:<br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">https://bluesoul.me/files/PMAStarterKit.zip
</code></pre><br />
كلمه السر هي: <span style="font-weight: bold;" class="mycode_b">malware</span><br />
<br />
قائمه الأدوات تشمل التالي:<br />
 <ul class="mycode_list"><li>MD5DEEP 4.4 and related tools (sha1deep, hashdeep, whirlpooldeep, etc) and 64-bit equivalents.<br />
</li>
<li>WinMD5Free v1.20<br />
</li>
<li>PEiD v0.95 with KANAL plugin<br />
</li>
<li>Strings v2.52<br />
</li>
<li>upx 3.91<br />
</li>
<li>PEview v0.9.9<br />
</li>
<li>Resource Hacker v4.2.5<br />
</li>
<li>PEBrowse Professional v10.1.4<br />
</li>
<li>PEBrowse64 Professional v6.3.1<br />
</li>
<li>PE Explorer 1.99 R6 (Trial)<br />
</li>
<li>Process Monitor (procmon) v3.2<br />
</li>
<li>Process Explorer (procexp) v16.10<br />
</li>
<li>Regshot v1.9.0<br />
</li>
<li>ApateDNS v1.0<br />
</li>
<li>Netcat (nc) 1.11 and 64-bit build<br />
</li>
<li>Wireshark v2.0.3<br />
</li>
<li>FakeNet 1.0c (INetSim alternative for Windows)<br />
</li>
<li>Combined Volume Set of Intel® 64 and IA-32 Architectures Software Developer’s Manuals<br />
</li>
<li>IDA Pro Free v5.0 with FindCrypt plugin, IDA Entropy Plugin<br />
</li>
<li>Autoruns v13.51 and autorunsc<br />
</li>
<li>OllyDbg v1.10 and v2.01d<br />
</li>
<li>OllyDump Plugin<br />
</li>
<li>WinDbg x86 and x64 v6.11.1.404<br />
</li>
<li>Immunity Debugger (ImmDbg) v1.85<br />
</li>
<li>SoftICE 4.05 for w98 and NT/XP (SEE FOOTER)<br />
</li>
<li>SoftIceNT 4.2.7 (from 2.7 Driver Studio build) for XP (SEE FOOTER)<br />
</li>
<li>OSR Driver Loader v3.0<br />
</li>
<li>Poison Ivy RAT 2.3.2 (Password is “malware” with no quotes, if the exe is eaten by your AV)<br />
</li>
<li>pwdump6 (as PwDump.exe)<br />
</li>
<li>pwdump7<br />
</li>
<li>Pass-The-Hash Toolkit v1.4<br />
</li>
<li>Metasploit Framework v4.11.7<br />
</li>
<li>PyCrypto (Requires Python 2.7)<br />
</li>
<li>Snort 2.9.8.2<br />
</li>
<li>ScoopyNG v1.0<br />
</li>
<li>Mandiant Red Curtain 1.0<br />
</li>
<li>ASPack 2.39 (Trial)<br />
</li>
<li>PETite v2.4<br />
</li>
<li>WinUPack v0.39 Final<br />
</li>
<li>Themida 2.4.1.0 (Trial)<br />
</li>
<li>shellcode_launcher.exe (Gone from practicalmalwareanalysis.com)<br />
</li>
<li>Bochs 2.6.8<br />
</li>
<li>Burp Suite 1.7.03<br />
</li>
<li>CaptureBAT 2.0.0–5574<br />
</li>
<li>Cuckoo 2.0-RC1 (Requires Python)<br />
</li>
<li>CFF Explorer (As Explorer Suite 4)<br />
</li>
<li>WinHex 18.8.0.0<br />
</li>
<li>Import REConstructor (ImpREC) 1.7e<br />
</li>
<li>LordPE 1.41 Deluxe<br />
</li>
<li>Malcode Analyst Pack<br />
</li>
<li>Memoryze 3.0<br />
</li>
<li>OfficeMalScanner 0.5<br />
</li>
<li>Zynamics BinDiff 4.20 (Key provided by Zynamics)<br />
</li>
<li>pdfid.py and pdf-parser.py (Requires Python, obviously)<br />
</li>
<li>Sandboxie v5.10<br />
</li>
<li>Buster Sandbox Analyzer v1.88 Update 4<br />
</li>
<li>TCPView v3.05<br />
</li>
<li>The Sleuth Kit 4.2.0 for Windows<br />
</li>
<li>VERA v0.3<br />
</li>
<li>Volatility 2.5<br />
</li>
<li>Yara v1.7.1 x86 and x64<br />
</li>
</ul>
<div style="text-align: right;" class="mycode_align"> </div>
تحذير:<br />
يرجى توخي الحذر الشديد. توجد عينات أكواد برمجية ضارة متوفرة في الجزء الخاص بالـ Lab و بعضها هي برامج ضاره حقيقيه مرتبطه بـ سيرفات C2. و يفضل أستخدام نسخه ويندوز وهميه لحمايه نظامك الأساسي.<br />
<br />
<br />
هذه الأدوات مستخدمه في الكتاب:<br />
 <br />
<div style="text-align: left;" class="mycode_align">Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software - 1st Edition </div>
<br />
و رابط الكتاب على موقع أمازون هو:<br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901
</code></pre> Topics covered are the following:<ul class="mycode_list"><li>Set up a safe virtual environment to analyze malware<br />
</li>
<li>Quickly extract network signatures and host-based indicators<br />
</li>
<li>Use key analysis tools like IDA Pro, OllyDbg, and WinDbg<br />
</li>
<li>Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques<br />
</li>
<li>Use your newfound knowledge of Windows internals for malware analysis<br />
</li>
<li>Develop a methodology for unpacking malware and get practical experience with five of the most popular packers<br />
</li>
<li>Analyze special cases of malware with shellcode, C++, and 64-bit code<br />
</li>
</ul>
و هو كتاب هام لمن يرغب بالعمل في مجال الأمن السبراني]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[StormKitty Malware Analysis - C# Stealer/Clipper]]></title>
			<link>https://www.at4re.net/f/thread-3203.html</link>
			<pubDate>Tue, 30 Aug 2022 22:15:53 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=0">R333T</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3203.html</guid>
			<description><![CDATA[<img src="https://www.at4re.net/f/images/smilies/Salam.gif" alt="Salam" title="Salam" class="smilie smilie_72" /><br />
<br />
<br />
شرح بالأنجليزية وجدته نافع جدا اليكم رابط الفيديو <br />
<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://www.youtube.com/watch?v=di0XwRV3rik
</code></pre><br />
<br />
مع العلم اني رفعت نسخة احتياطية في حال حذف الفيديو  <img src="https://www.at4re.net/f/images/smilies/biggrin.gif" alt="Big Grin" title="Big Grin" class="smilie smilie_4" /><br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://t.me/at4redotnet/2485
</code></pre><br />
<br />
<img src="https://www.at4re.net/f/images/smilies/rose.gif" alt="rose" title="rose" class="smilie smilie_35" /> <img src="https://www.at4re.net/f/images/smilies/rose.gif" alt="rose" title="rose" class="smilie smilie_35" /> <img src="https://www.at4re.net/f/images/smilies/rose.gif" alt="rose" title="rose" class="smilie smilie_35" />]]></description>
			<content:encoded><![CDATA[<img src="https://www.at4re.net/f/images/smilies/Salam.gif" alt="Salam" title="Salam" class="smilie smilie_72" /><br />
<br />
<br />
شرح بالأنجليزية وجدته نافع جدا اليكم رابط الفيديو <br />
<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://www.youtube.com/watch?v=di0XwRV3rik
</code></pre><br />
<br />
مع العلم اني رفعت نسخة احتياطية في حال حذف الفيديو  <img src="https://www.at4re.net/f/images/smilies/biggrin.gif" alt="Big Grin" title="Big Grin" class="smilie smilie_4" /><br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://t.me/at4redotnet/2485
</code></pre><br />
<br />
<img src="https://www.at4re.net/f/images/smilies/rose.gif" alt="rose" title="rose" class="smilie smilie_35" /> <img src="https://www.at4re.net/f/images/smilies/rose.gif" alt="rose" title="rose" class="smilie smilie_35" /> <img src="https://www.at4re.net/f/images/smilies/rose.gif" alt="rose" title="rose" class="smilie smilie_35" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cerbero Suite Advanced]]></title>
			<link>https://www.at4re.net/f/thread-3177.html</link>
			<pubDate>Sun, 14 Aug 2022 21:59:39 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=3325">H@wk0</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3177.html</guid>
			<description><![CDATA[برنامج Cerbero Suite Advanced مصمم للخبراء في مجال الأمن و الطب الشرعي <br />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.ibb.co/grcCd0v/image.png" loading="lazy"  alt="[صورة مرفقة: image.png]" class="mycode_img" /></div>
<br />
<br />
مزاياه:<ul class="mycode_list"><li>State-of-the-art suite of tools for malware triage and file analysis.<br />
</li>
<li>Analysis for many file formats including PE, Mach-O, ELF, Java, SWF, DEX, PDF, DOC, XLS, RTF, Zip and many more.<br />
</li>
<li>Carbon Interactive Disassembler, byte-code disassemblers (.NET MSIL, Java, DEX, ActionScript2/3, VBA, fonts)<br />
</li>
<li>Hex editor with layouts<br />
</li>
<li>JavaScript debugger<br />
</li>
<li>extremely rich Python3 SDK<br />
</li>
<li>extension support<br />
</li>
</ul>
<br />
رابط البرنامج:<br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">https://cerbero.io/ea/
</code></pre>]]></description>
			<content:encoded><![CDATA[برنامج Cerbero Suite Advanced مصمم للخبراء في مجال الأمن و الطب الشرعي <br />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.ibb.co/grcCd0v/image.png" loading="lazy"  alt="[صورة مرفقة: image.png]" class="mycode_img" /></div>
<br />
<br />
مزاياه:<ul class="mycode_list"><li>State-of-the-art suite of tools for malware triage and file analysis.<br />
</li>
<li>Analysis for many file formats including PE, Mach-O, ELF, Java, SWF, DEX, PDF, DOC, XLS, RTF, Zip and many more.<br />
</li>
<li>Carbon Interactive Disassembler, byte-code disassemblers (.NET MSIL, Java, DEX, ActionScript2/3, VBA, fonts)<br />
</li>
<li>Hex editor with layouts<br />
</li>
<li>JavaScript debugger<br />
</li>
<li>extremely rich Python3 SDK<br />
</li>
<li>extension support<br />
</li>
</ul>
<br />
رابط البرنامج:<br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">https://cerbero.io/ea/
</code></pre>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Chaos Ransomware Builder]]></title>
			<link>https://www.at4re.net/f/thread-3171.html</link>
			<pubDate>Fri, 05 Aug 2022 06:56:27 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=218">c0re3</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3171.html</guid>
			<description><![CDATA[السلام علیکم و رجمت الله. <img src="https://www.at4re.net/f/images/smilies/smile.gif" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
this file contain Chaos Ransomware Builder V4.0.  <img src="https://www.at4re.net/f/images/smilies/bigsmile.gif" alt="bigsmile" title="bigsmile" class="smilie smilie_25" /><br />
<br />
Test it on a VMWare and use it at your own risk<br />
 <br />
<pre class="block-code"><code class="language-none">
https://gofile.io/d/40MlnJ
</code></pre><br />
وَلَا تَجْعَلُوا مَعَ اللَّهِ إِلَهًا آخَرَ إِنِّي لَكُمْ مِنْهُ نَذِيرٌ مُبِينٌ ﴿۵۱﴾ <img src="https://www.at4re.net/f/images/smilies/rose.gif" alt="rose" title="rose" class="smilie smilie_35" />]]></description>
			<content:encoded><![CDATA[السلام علیکم و رجمت الله. <img src="https://www.at4re.net/f/images/smilies/smile.gif" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
this file contain Chaos Ransomware Builder V4.0.  <img src="https://www.at4re.net/f/images/smilies/bigsmile.gif" alt="bigsmile" title="bigsmile" class="smilie smilie_25" /><br />
<br />
Test it on a VMWare and use it at your own risk<br />
 <br />
<pre class="block-code"><code class="language-none">
https://gofile.io/d/40MlnJ
</code></pre><br />
وَلَا تَجْعَلُوا مَعَ اللَّهِ إِلَهًا آخَرَ إِنِّي لَكُمْ مِنْهُ نَذِيرٌ مُبِينٌ ﴿۵۱﴾ <img src="https://www.at4re.net/f/images/smilies/rose.gif" alt="rose" title="rose" class="smilie smilie_35" />]]></content:encoded>
		</item>
	</channel>
</rss>