SecurityXploded.com
Mailing List Join us on Google+ Twitter facebook RSS Feeds
Home Page - www.SecurityXploded.com
 Merry Christmas & Happy New Year 2013
  • We wish all our users Merry Christmas and Very Happy New Year. Hope this new year brings greater joy & fortune in your life

 New Tool - WindowsAutologinPassword
  • Windows Autologin Password is the free command-line tool to quickly dump and manage the Windows Automatic Logon Password

    • By Nagareshwar Talekar | 23rd Dec 2012
 Advanced Malware Analysis Session 1 - Detection & Removal of Malwares
  • We have just finished the first session of our new 'Advanced Malware Analysis' training series in our last meet. The presentation & video demo's of this session are live now. Enjoy !!!

 New Article - Exposing the WiFi Password Secrets
  • This research article throws light on the internal password storage and encryption mechanism used for storing the WiFi account passwords. It explains where the WiFi passwords are stored on different platforms...

    • By Nagareshwar Talekar | 7th Dec 2012
 Five Million Downloads !!!
 New SecurityPhresh Beta Edition
 Latest Software Releases & Updates
New Software - WindowsAutologinPassword v1.0
  • Windows Autologin Password is the free command-line tool to quickly dump and manage the Windows Automatic Logon Password

ThunderbirdPassDecryptor v2.5 - Thunderbird Password Recovery Tool
  • ThunderbirdPassDecryptor is the FREE tool to instantly recover the stored mail account passwords by Thunderbird.

SXSystemSuite v2.0 - The Complete System Management Toolset from SecurityXploded
  • SX System Suite is the complete collection of all the FREE System Analysis & Monitoring softwares released by SecurityXploded.

New Software - ProductKeyDecryptor v1.0
  • Product Key Decryptor is the FREE software to instantly recover License Keys of popular Windows products

BrowserHistorySpy v1.5 - All-in-one Browser History Viewer Software
  • Browser History Spy is the all-in-one software to instantly recover or view the browsing history from popular web browsers. It shows website history from top three browsers Firefox, Chrome and Internet...

More Tools
 Reversing and Malware Analysis Training
Adv Malware Analysis Session 1 - Detection and Removal of Malwares
  • In this first session of our Advanced Malware Analysis Training series, Nagareshwar gave overview of virus removal process where as Monnappa showed practical techniques with four Video demonstrations of real life malware samples.

    • Monnappa/Nagareshwar | 15th Dec 2012
Session 11 - Future Roadmap
  • This session, the last one of our current training series, put forth what all we have covered so far, what we will be doing at SecurityXploded and launch of our next new training series...

    • Monnappa/Amit Malik | 24th Nov 2012
Session 10 - Case Study : Rootkit Analysis
  • In this splendid session, Monnappa showed Rootkit Analysis with awesome four demos of popular malwares like carberp, prolaco. He talked about various techniques used by Rootkits like SSDT, DKOM...

Session 9 - Practical Reversing : Exploit Development Advanced
  • In this session, he talked about advanced exploit development topics covering GS Cookie Protection, SafeSEH, Heap Spray, ASLR, DEP Bypass...

Security Training
 Popular Security News
Analysts: Anonymous to decline in 2013
  • Security vendor finds hacking group predictable.

McAfee Labs predicts the decline of Anonymous
Iran Retracts Reports of New Stuxnet-Like Attacks Against Utilities
Malware Spies on, Cheats at Korean Card Games
Researcher Unwraps Dangerous NVIDIA Driver Exploit on Christmas Day
Facebook Updates iOS Camera App to Patch Security Flaw
New WordPress vuln emerges
Microsoft Warns of New Gaming Malware
See More
 Partner Security Conferences
Cyber Intelligence Asia 2013
  • Intelligence-Sec is gearing up for their first inaugural Cyber Intelligence Asia event in early 2013. This conference will bring together senior cyber strategists from the public and private sector to...

    • Kuala Lumpur, Malaysia | Mar 12-15 2013
Our Partners
 Latest Security Research Articles
Reference Guide - Reversing & Malware Analysis Training
  • This is the complete reference guide to all sessions of our Reverse Engineering & Malware Analysis Training program.

    • By Amit Malik | 16th Dec 2012
Exposing the WiFi Password Secrets
  • This research article throws light on the internal password storage and encryption mechanism used for storing the WiFi account passwords. It explains where the WiFi passwords are stored on different platforms and how to decrypt them using the...

    • By Nagareshwar Talekar | 7th Dec 2012
Password Secrets of Popular Windows Applications
  • In today's Internet driven world, all of us use one or other applications starting from browsers, mail clients to instant messengers. Most of these applications store the sensitive information such as user name, password in their private location...

    • By Nagareshwar Talekar | 16th Nov 2012
The covert way to find the Reference Count of DLL
  • Reference count or load count of the DLL is the number of times the DLL is loaded into the process. Windows APIs does not provide much information about loaded DLLs. This article explains how to find out the reference count of DLL using the...

    • By Nagareshwar Talekar | 7th Sep 2012
Remote Thread Execution in System Process using NtCreateThreadEx for Vista/Win7
  • This article provides practical implementation of using NtCreateThreadEx function to execute remote thread into any process on Vista/Windows 7 platform. Though it is undocumented function, it provides universal solution for executing code in...

    • By Nagareshwar Talekar | 7th Sep 2012
More Articles
 Special Testimonial
  • I have used 'SecurityXploded' tools for some time now and have found them to be an invaluable asset in many of our forensic investigations. With so many malicious code developers in the world, we are happy that these folks are...

    • James Cadden, East Lansdowne Police Dept. Delaware, PA. USA
 Awards for Our Softwares