lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20051222220448.15738.qmail@securityfocus.com>
Date: 22 Dec 2005 22:04:48 -0000
From: mvalsmith@...il.com
To: bugtraq@...urityfocus.com
Subject: Malware sample site


Just wanted to let you guys know about a new computer security site at
http://www.offensivecomputing.net

The purpose of this site is to foster collaborative analysis, cataloging and
identification of malware in order to improve defense and awareness.
This was something myself and other colleagues have seen the need for a long
time but could never find anything similar because most malware
collections are either closed lists or corporate non-public collections.
This site is free and open to all.

The basic idea is to have a community site where you can search for malware
based on name or md5sum and get zipped copies.
People can upload their own samples of malware and collaborate on analysis
in a sort of a blog style. (think community commented
disassembles, graphs, ida databases, etc.)

I know there are some problems with the concept such as using md5sums but
its a start and has proven useful already.
I've got some malware collection stuff to help add to the database and I
have a small collection built up over the years
that I am slowly adding as well.

I've started it off with some copies of common stuff like welchia, sobig,
the sony drm rootkit, etc. and some minimal analysis.

This is NOT another Vx'ers site and the purpose isn't to propagate worms or
viruses but rather provide a medium for people to
conduct collaborative defense research with full access to the tools and
samples.

We're interested in any feedback, collaborations, and ideas from the
community and have already gotten a ton of response since launching last
Friday.

have a good one,

V. 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ