Public malware techniques used in the wild: Virtual Machine, Emulation
A lightweight process isolation tool that utilizes Linux namespaces
Creates wordlist for bruteforce
A program that detects and blocks phishing, pharming, Hacker's C&C.
Online Multi-Engine Antivirus Scanner
Logs IP to IP contact, number of packets, bytes.
EFT simulator