exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 58 RSS Feed

Files from Beenu Arora

Email addressbeenudel1986 at gmail.com
First Active2007-12-02
Last Active2014-05-20
Hook Analyser Malware Tool 3.1
Posted May 20, 2014
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: In this build, significant changes have been made to static malware analysis (option #3) and Cyber threat intelligence (option #6) modules, along with addition of a new module - batch analysis (option #7).
tags | tool
SHA-256 | 2b359846b73883d71d48cf30b1de7ed29f76ffe6378eab910e62d879a5dffbec
Hook Analyser Malware Tool 3.0
Posted Dec 24, 2013
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: In terms of improvements, a new module has been added - Cyber Threat Intelligence.
tags | tool
SHA-256 | 60cd90856b59ffce547be69abf79b3ae7284db2920b97586609cbbea07708739
Hook Analyser Malware Tool 2.6
Posted Sep 23, 2013
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: Added new signatures, various bug fixes, and fixed a start up error.
tags | tool
SHA-256 | b26e5214de3d3875ccca59d6cfbffb8dfa87ab40288d159dc5713ec7d29109eb
Hook Analyser Malware Tool 2.5
Posted May 14, 2013
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: Hook Analyser can now perform XOR bruteforce on "encoded/obfuscated" executables. Deep search improved (new signatures added). Bug fixes.
SHA-256 | 045f5f0ecd20de83f65cd4ccb4ad415cf4c87bccad9fa04b9f1a6a2b8f4d4524
Hook Analyser Malware Tool 2.3
Posted Feb 14, 2013
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: New digger module that allows dumping of exes, dlls, and drivers from an executable to separate files. New packer detection and hexdump modules added.
SHA-256 | 6d0c3ae3f1c1c82fc02292864c2d515ea8bb0b84e4978f88e74d9798eacfecb0
Hook Analyser Whitepaper
Posted Dec 27, 2012
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a freeware project, started in 2011, to analyse an application during the run-time. The project can be potentially useful in analysing malwares (static and run time), and for performing application crash analysis. This paper breaks down the features and functionality of the tools and provides guidance on usage.

tags | paper
SHA-256 | ed9f551626fc0ef6a9249da2d0f785a54fd706f84324da2698fdb8fd408895f4
Hook Analyser Malware Tool 2.2
Posted Dec 25, 2012
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: The UI and modules of the project have been re-written. The interactive mode is now more verbose. The (static) malware analysis module has been enhanced. Bug fixes and other improvements.
tags | tool
SHA-256 | 506f27036f5d26070daf3d3c62cc27e131c705c194181de5ed9e10398b57c1f9
Hook Analyser Malware Tool 2.1
Posted Oct 23, 2012
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: Improved the UI. Added exploit Analysis module.
tags | tool
SHA-256 | 1b439ebab261ffcbe48d003f00d7836149ded3ebcbcc7d200890b3f7876a0fd1
Hook Analyser Malware Tool 2.0
Posted Jun 28, 2012
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: This is a major release with improved static analysis functionality, a nice fingerprinting feature, improvements on modules, and more.
SHA-256 | 40872e53db04f39bca6a732865f07e2f6c917473b1e6b14b9b3cf3270a04df6d
Hook Analyser Malware Tool 1.4
Posted Apr 4, 2012
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: Output log file parsing for quick analysis. Improved hooking. Bug fixes.
SHA-256 | 7d2f41a189390b8efaf5de59d7f1048df482a9a4feec248e24e479441c720637
Hook Analyser Malware Tool 1.3
Posted Nov 14, 2011
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: Various updates.
tags | tool
systems | windows
SHA-256 | 1db4bd2ca0c97c9afeaffcb6b692042479d67663172e6fc873ec367da67ecb4e
Malware Analyser 3.3
Posted Oct 3, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added traces signatures. Improved parsing. Bug fixes.
tags | tool, forensics
SHA-256 | f349bdbbeafc34f1e51d0e1bafb7ebaade4f4140aa0d2c8365eae7c7b00ab480
Hook Analyser Malware Tool
Posted Sep 13, 2011
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

SHA-256 | 5c11c01a960f568a12c3f67e3d3a95b84fe85db2801fc75ceaea8e5ad67ce77d
Malware Analyser 3.2
Posted Jul 16, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added ThreatExpert for online scanning option. Packed libraries onto single executable. Improved traces signatures. Bug fixes.
tags | tool, forensics
SHA-256 | 8f97c0865fbaa3413d8b485397cc6e12ec502b7798cce86f6a4b246286cdf22f
Malware Analyser 3.1
Posted Jun 12, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added DLL analysis and batch mode scan.
tags | tool, forensics
SHA-256 | 3af0d1f22f3669d267dde29c93584f1f6061588dcdc62dde41660a76aec55d2b
Malware Analyser 3.0
Posted Apr 21, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added banking trojan traces and dynamic register analysis. Improved traces signatures. Various other updates.
tags | tool, forensics
SHA-256 | f0441c544a8826462e893ab8a63bb69a28c9d6e665cbbe115dcd76279374aa05
Joomla 1.5.x Cross Site Request Forgery
Posted Sep 23, 2010
Authored by Beenu Arora

Joomla version 1.5.x suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 903b9fa01764e1caf82e7d2da59ca874a54b55131b5d3006d476044aeb34b36d
Roxio Photosuite 9 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Roxio Photosuite 9 DLL hijacking exploit.

tags | exploit
SHA-256 | 0673623e4daf0095f0aca4e6739f617f310041d32cb13b78270f759e5dd9701c
Microsoft Vista BitLocker Drive Encryption API Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Vista BitLocker Drive Encryption API hijacking exploit.

tags | exploit
SHA-256 | 5c66ed28ebd6ae2b56c4578cf0a93f142a740f227c4ef0078393ba2c7555087c
Microsoft Group Convertor DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Group Convertor DLL hijacking exploit that leverages imm.dll.

tags | exploit
SHA-256 | b3073d944be9dd9a308cfc510cc96753487c9aa684cdbeb98bc7195d441a99d9
TeamMate Audit Management Software Suite DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

TeamMate Audit Management Software Suite DLL hijacking exploit.

tags | exploit
SHA-256 | 513327618ac8756646178f1c4048f7a241d4988a8bf12c0c6331fa4a0a321f87
Microsoft Office Groove 2007 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Office Groove 2007 DLL hijacking exploit.

tags | exploit
SHA-256 | f0258ce9b5a28500bd848a587b3984889e0bce3643e1adcd3dc8e5ddf1fa8ff9
Microsoft Address Book DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Address Book DLL hijacking exploit.

tags | exploit
SHA-256 | 4f13c8d637df82e2669e80503452e208a22553dcc70cc3695cdef1089e39e778
Microsoft Visio 2003 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Visio 2003 DLL hijacking exploit.

tags | exploit
SHA-256 | 3e00f49e2eb44c58485e53faebeef2a18d390f7268fa849ffcd59787dddf2ad4
Microsoft Internet Connection Signup Wizard DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Beenu Arora

Microsoft Internet Connection Signup Wizard DLL hijacking exploit.

tags | exploit
SHA-256 | 48ee2fa44f4b8de751510aba4e53106abfc05a765d4579c77f071cdeeb0adfbe
Page 1 of 3
Back123Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close