Profile

Cover photo
RogueKiller
117 followers|28,825 views
AboutPostsPhotosVideos

Stream

RogueKiller

Shared publicly  - 
 
RunPE: How to hide code behind legit a process   Study of a hack used by malware to hide code inside a well know process.     Introduction   Disclaimer: This is not a tutorial to make a malware, but a practical case for educational purpose only. Anyway,…
RunPE: How to hide code behind legit a process - RunPE is a trick used by some malware to hide code into a legit process. Learn how to detect.
2
Add a comment...

RogueKiller

Shared publicly  - 
 
Of PUPs and other demons   Story about a PUP using malware technology…     Introduction   What is a PUP? PUP means “Potentially Unwanted Program”. They are designated that way (or sometimes “Not-A-Malware”) because they are in theory not harmful for you,…
Of PUPs and other demons   Story about a PUP using malware technology…     Introduction   What is a PUP? PUP means “Potentially Unwanted Program”. They are designated that way (or sometimes “Not-A-Malware”) because they are in theory not harmful for you, just annoying. A few examples: Zeus is a real malware, because it …
1
Add a comment...

RogueKiller

Shared publicly  - 
 
Bootkit removal with RogueKiller   How to remove Bootkits with RogueKiller     Description   Bootkits are rootkits infecting the Master Boot Record (MBR) or sometimes the Volume Boot Record (VBR) of a partition. Those rootkits take advantage of super…
Bootkit removal with RogueKiller - Bootkits are rootkits infecting the MBR/VBR. Learn how to remove.
1
Add a comment...

RogueKiller

Shared publicly  - 
 
Les nouvelles statistiques sont ici :)  
 ·  Translate
2
Add a comment...

RogueKiller

Shared publicly  - 
 
New statistics are here :)  
1
Add a comment...

RogueKiller

Shared publicly  - 
1
Add a comment...
Have them in circles
117 people
Techtivity, LLC's profile photo
valérie Vandenberghe Dhennin's profile photo
Milos Majstorovic's profile photo
Daniel Edessou's profile photo
macflague dd's profile photo
Dmitry Martynov's profile photo
Mirek Fertek's profile photo
loris rossi's profile photo
Vladimír Slanec's profile photo

RogueKiller

Shared publicly  - 
 
Malware, viruses, what are they?   General explanation about different kinds of online threats. What they do, and how.     Introduction   Viruses, malware, worms, adware, there are many different kinds of online threats. It can be confusing for one to…
Malware, viruses, what are they? General explanation about different kinds of online threats. What they do, and how.
2
Add a comment...

RogueKiller

Shared publicly  - 
 
BHO: A spy in your browser   Or how Internet Explorer extensions can turn into a Spy.     Introduction   What is a BHO? A BHO (for Browser Helper Object) is a module (often a DLL) that acts as a plugin for either explorer.exe or Internet Explorer. Most of…
BHO: A spy in your browser - BHO are also known as Internet Explorer extensions, see what they can do to spy you.
1
Add a comment...

RogueKiller

Shared publicly  - 
 
Gootkit/Xswkit removal with RogueKiller   How to remove Gootkit variants (Xswkit) with RogueKiller     Little Analysis   Gootkit is a malware with trojan/backdoor features, and fileless behavior. The payload (malware file) is injected into several legit…
Gootkit/Xswkit removal with RogueKiller - Gootkit is a fileless malware injecting legit process, and using Poweliks trick to start at boot. How to remove.
2
Add a comment...

RogueKiller

Shared publicly  - 
 
Zeus removal with RogueKiller   How to remove Zeus variants (Citadel) with RogueKiller     Little Analysis   Zeus is a malware with banking/stealer features. The payload (malware file) is injected into several legit processes, even maybe in your…
Zeus removal with RogueKiller - Zeus Citadel is a banking trojan able to steal credit card and FTP or email credentials. Learn how to remove it.
1
1
talbi karim's profile photo
Add a comment...

RogueKiller

Shared publicly  - 
 
Userland rootkits: Part 1, IAT hooks   This is the first part of this series about Userland rootkits, I wanted to write on it and demonstrate how some rootkits do to hide files by using IAT hooks.   This post is about a classic trick, known for decades.…
Userland rootkits: Part 1, IAT hooks - IAT hooks are used by rootkits and antivirus. Learn how it works.
1
Add a comment...

RogueKiller

Shared publicly  - 
Poweliks removal with RogueKiller - Poweliks is a trojan with Rootkit-like features, directly stored in the registry.
1
Add a comment...
People
Have them in circles
117 people
Techtivity, LLC's profile photo
valérie Vandenberghe Dhennin's profile photo
Milos Majstorovic's profile photo
Daniel Edessou's profile photo
macflague dd's profile photo
Dmitry Martynov's profile photo
Mirek Fertek's profile photo
loris rossi's profile photo
Vladimír Slanec's profile photo
Contact Information
Contact info
Email
Story
Tagline
RogueKiller is a tiny antimalware able to defeat most known malware and some rootkits