181011 23k 0 US-CERT AA18-284A Publicly Available Tools Seen in Cyber Incidents Worldwide, in HTML format: How to limit effectiveness and detect use of. This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States. Distributed by the United States Computer Emergency Readiness Team Website: https://www.us-cert.gov
181003 15k 0 US-CERT TA18-276A Using Rigorous Credential Control to Mitigate Trusted Network Exploitation, in HTML format from the United States Computer Emergency Readiness Team. Website: https://www.us-cert.gov
181003 17k 0 US-CERT TA18-276B Advanced Persistent Threat Activity Exploiting Managed Service Providers in HTML format from the United States Computer Emergency Readiness Team. Website: https://www.us-cert.gov
181003 1940k 0 US-CERT AR18-275A MAR-1021537 - HIDDEN COBRA FASTCash-Related Malware, in HTML format from the United States Computer Emergency Readiness Team, Homeland Security, Treasury and the FBI. Website: https://www.us-cert.gov
181002 15k 0 US-CERT TA18-275A HIDDEN COBRA - FASTCash Campaign, in HTML format from the United States Computer Emergency Readiness Team, Homeland Security, Treasury and the FBI. Website: https://www.us-cert.gov
180912 33M 0 stinger32.exe Weekly 32-bit Stinger stinger64.exe Weekly 64-bit Stinger A STANDALONE utility used to detect & remove specific viruses. It is NOT a substitute for full anti-virus protection! Stinger Utilizes next-generation scan technology, including rootkit scanning, and scan performance optimizations. Daily updates at: http://www.mcafee.com/us/downloads /free-tools/stinger.aspx
170428 19k 0 TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors from U.S. Department of Homeland Security, National Cyber Awareness System: National Cybersecurity and Communications Integration Center (NCCIC) WARNING.
140724 680k 2 ClamSentinel1.21 a system tray application that detects file system changes and scans the files modified using ClamWin (requires the installation of this antivirus). Also detects new drives added (like usb pen). http://clamsentinel.sourceforge.net/
130507 22M 1 McAfee AVERT Stinger v3.127 FREEware stand- alone utility used to Detect and Remove specific virii as of May 7th 2013, original executable file now named sting32.exe and/or sting64.exe. See STINGER.TXT for changes. To Scan & Clean under Windows just Execute. Windows ME/XP users should first read DSysRest.Txt, enclosed. http://vil.nai.com/vil/stinger/
130420 11M 1 McAfee AVERT Stinger v3.109 FREEware stand- alone utility used to Detect and Remove specific virii (as of Nov 22nd '05, original executable file now named stng259.exe). See STINGER.TXT for changes. To Scan & Clean under Windows (32-bit) just Execute. Windows ME/XP users should first read DSysRest.Txt, enclosed. http://vil.nai.com/vil/stinger/
080207 21M 6 MWAV is MicroWorld's Free AntiVirus Toolkit Utility that Scans for Viruses, Spyware and Adware. No install, just run. All Windows thru VISTA+64bit. Free demo, some repairs require purchase of full product from http://www.mwti.com
070331 2948k 6 Spyware Terminator v188.8.131.525 [Freeware] for Win98/Me/XP/Vista is a program that removes spyware, adware, trojans, keyloggers, home page hijackers, and other malware threats. It features Real-Time Protection and includes a Real-Time Shield. Integrates with the free ClamAV antivirus program. It checks processes, libraries, services, BHOs, toolbars, WinSock2, Registry startups, uninstallers, Start menu, desktop, favorites, cookies, etc.
051201 1355k 7 TrueCrypt v4.1 Free Open-Source On-The-Fly Disk Encryption Software for Windows XP/2k. Create a virtual encrypted disk within a file (4GB limit if FAT32, none for NTFS) and mount it as a real disk; Encrypt an entire hd partition or a device (no limits), such as USB memory stick, floppy, etc. Supports AES-256, Blowfish-448, CAST5, Serpent-256, Triple DES and Twofish-256. http://www.truecrypt.org/
040315 617k 6 FireLogXP v1.12 for Windows XP running the Internet Connection Firewall (ICF). Reads the log file and shows sources and ports where intrusions are occurring. Include and/or exclude protocols, connection types, and TCP flags. Connects to on-line resources for port info and exploits. Freeware. A TechTV File of the Day.