Avast WEBforum

Other => Viruses and worms => Topic started by: polonus on September 22, 2018, 03:46:24 PM

Title: URL endoder decoder blocked by Malwarebytes extension...
Post by: polonus on September 22, 2018, 03:46:24 PM
As a user of Bobby Spasic's Malzilla, I followed the read here:
-> https://sourceforge.net/p/malzilla/discussion/726146/thread/e3a6de81/?limit=25#ea81

Then tried to decode that particular code example found in the txt,
after which the site I performed that encoding decoding from was blocked by MalwareBytres extension
(very much like that extension's protection  ;)).

Code did not have a particular payload, still was potent enough in it's outlay  to trigger an alarm,
as hxtp://www.utilities-online.info/urlencode/ was alerted producing suspicious activity.

So users here are advised not to do what I have done, as code should be at once nullified!

A way to do it is run the decoded code inside malzilla as that has ample sandboxing to study such examples.
Mainly use for my flaw of the Malzilla browser is dissecting redirects.
I use my enhanced special version with my own additions, since the latest version that came out during 2013.

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)