Virus Articles

Found 72 articles

Bypass Anti-virus using Veil Framework

Ajay yadav
Ajay yadav
Updated on 25-Mar-2026 2K+ Views

This article demonstrates how to bypass antivirus detection using the Veil Framework, a collection of penetration testing tools. The framework consists of several modules designed for payload generation and evasion techniques. Veil Framework Components The Veil Framework includes the following key modules − Veil-Evasion − generates antivirus-evading payloads using various techniques and programming languages Veil-Catapult − a psexec-style payload delivery system that integrates with Veil-Evasion Veil-PowerView − a PowerShell tool for network reconnaissance on Windows domains Veil-Pillage − a modular post-exploitation framework integrated with ...

Read More

Types of Viruses

Pranavnath
Pranavnath
Updated on 16-Mar-2026 9K+ Views

A computer virus is a type of malicious code that enters the system along with files or programs and carries out malfunctions in the system. The virus-affected program becomes a replica of the existing program. They enter the system through files and when the file runs, the virus also runs in the background. Viruses infiltrate systems through various methods including email attachments, clicking malicious advertisements, and downloading software from unauthorized websites. Their main objective is to spread across different hosts while stealing personal data and system credentials. Types of Computer Viruses A virus is a specific type ...

Read More

What is Unified Threat Management(UTM)?

Pranavnath
Pranavnath
Updated on 16-Mar-2026 635 Views

Security risks have become more complex and common in today's digital world. Cybercriminals continuously evolve their strategies for exploiting vulnerabilities in networks, applications, and devices. Organizations must implement comprehensive security measures to mitigate these threats. Unified Threat Management (UTM) is one such security technology that provides a comprehensive approach to network security. UTM is a security solution that integrates multiple security technologies into a single platform to address a wide range of threats. This article explains the concept of UTM, its functionality, and its advantages and disadvantages. What is Unified Threat Management (UTM)? Unified Threat Management (UTM) ...

Read More

Bypass Antivirus with Shelter

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 1K+ Views

Shellter is a dynamic shellcode injection tool used in penetration testing to bypass antivirus detection. It works by taking legitimate PE (Portable Executable) files and injecting custom payloads into them while maintaining the original application's functionality, making the modified executable appear legitimate to antivirus software. Shellter operates differently from traditional packers or crypters by using dynamic analysis to understand the target executable's behavior, then strategically places shellcode at runtime locations that won't interfere with normal operation. How Shellter Works The tool employs several sophisticated techniques to achieve AV evasion: Dynamic Analysis − Shellter runs the ...

Read More

TheZoo Repository Live Malware Analysis

Ajay yadav
Ajay yadav
Updated on 16-Mar-2026 1K+ Views

TheZoo is an open-source repository that provides cybersecurity researchers and malware analysts with access to live malware samples for educational and research purposes. It enables the study of malware behavior, analysis techniques, and development of countermeasures in a controlled environment. TheZoo contains a comprehensive collection of malware samples categorized by family, type, and platform. This repository serves as a valuable resource for security professionals, researchers, and students who need to understand how malicious software operates and spreads. Installation and Setup To set up TheZoo repository on your system, follow these steps: git clone https://github.com/ytisf/theZoo cd ...

Read More

Trojan horse and Trap Door

Pranavnath
Pranavnath
Updated on 16-Mar-2026 4K+ Views

A program threat is malicious software designed to compromise system security, steal data, or gain unauthorized access. Two of the most significant program threats are Trojan horses and trap doors (backdoors), which can cause data corruption, information theft, and system compromise. These threats exploit vulnerabilities in systems to perform unauthorized activities, making it crucial for organizations and individuals to understand their mechanisms and implement proper security measures. Security Violations Program threats can lead to several types of security violations: Data theft − Stealing sensitive information like credit card numbers, passwords, and financial data Unauthorized modification ...

Read More

All about I love you Virus

Pranavnath
Pranavnath
Updated on 16-Mar-2026 333 Views

The I Love You virus, also known as the "ILOVEYOU" worm, was one of the most destructive computer viruses in history. Released in May 2000, this virus spread rapidly through email systems worldwide, causing billions of dollars in damage and infecting millions of computers within just a few days. This virus demonstrated the vulnerability of email systems and highlighted the importance of cybersecurity awareness. It was created by Onel de Guzman, a 24-year-old computer science student from the Philippines, and became a landmark case in cybersecurity history. How the I Love You Virus Works The virus spreads ...

Read More

Beware of the Bug: Navigating the World of Malicious

sudhir sharma
sudhir sharma
Updated on 16-Mar-2026 550 Views

In today's digital age, the threat of malware (malicious software) is more prevalent than ever. Malware comes in various forms such as viruses, worms, and ransomware — each designed to compromise computer systems or steal sensitive data. As cybercriminals continue to develop sophisticated techniques for deploying these threats, it's crucial that both novice and professional users stay informed about the different types of malware and their potential impacts on our digital lives. Common Types of Malware Virus Infects files Trojan ...

Read More

Difference between Virus and Malware

Manish Kumar Saini
Manish Kumar Saini
Updated on 16-Mar-2026 956 Views

In the field of computer security, the terms virus and malware are often used interchangeably, but they represent different concepts. A virus is a specific type of malicious program that can replicate itself and spread to other systems, while malware is a broader term encompassing all software designed to damage or adversely affect computer systems. Understanding the distinction between these terms is crucial for effective cybersecurity awareness and implementing appropriate protection measures. What is Malware? Malware (malicious software) is any computer program or software specifically developed for damaging, disrupting, or gaining unauthorized access to computer systems or ...

Read More

What are the differences between Phishing and Spear Phishing?

Bhanu Priya
Bhanu Priya
Updated on 16-Mar-2026 332 Views

Let us understand the concepts of Phishing and Spear Phishing before learning the differences between them. Phishing Phishing is a cybersecurity attack technique designed to obtain sensitive information like credit card PINs, email passwords, and social media credentials. Attackers steal data from individuals, companies, or institutions by creating deceptive communications. The attack works by sending fake web pages to users via email or SMS that closely resemble legitimate websites. When users log into these fraudulent pages and enter their details, hackers capture and steal this information. Phishing is a general practice where attackers randomly target groups ...

Read More
Showing 1–10 of 72 articles
« Prev 1 2 3 4 5 8 Next »
Advertisements