0

REAL MALWARE

Use this at your own risk, and for educational purposes.

Other payloads can be found here: https://abrasive-lantana-35c.notion.site/Real-Malware-hoster-578c09c109b84f599165614d37b2d30b

This page has been created in order to demonstrate proper function of NGFW / UTM / AV engines with real stuffs.

Exploit.PDF.Agent.u.ZIP Checkpoint Software

Exploit.PDF.Agent.u from Checkpoint Software

Eicar Dropper in Zip

Wildfire PE file from PaloAltoNetworks

Locky Ransomware Sample from Dasmalwerk

CoinMiner.1.3138E7A5 from Dasmalwerk

Graftor Executable from my Box folder

Locky Ransomware from my Box folder

Ardamax Keylogger from by Box folder

Maxim RBINET

Leave a Reply

Your email address will not be published. Required fields are marked *