We’ve all been there as a child and done that, downloading pirated software with cracks from torrent sites, be it antivirus, games or Microsoft Office software. Little did we know, hackers knew that the reason you uninstall an antivirus program is that you have no protection software enabled, so you are vulnerable, and the easiest way to infect your Windows machine is to use a Trojan horse ‘disabled’ antivirus.
Comodo Leak Tests used to be a very accurate and common tool for penetration testing. Sadly, they chose to discontinue the product. Even if you wanted to come clean and buy a real antivirus, it may be too late sometimes, because the virus is to be inserted into your device that during installation would uninstall all new antivirus, making them useless while you believe you are well covered. Simulating an actual ‘harmless’ virus attack is one way to find out if your antivirus is effective.
↓ 01 – RanSim | Free Ransomware Simulator Tool
How weak is your network to attacks from ransomware? Bad guys are increasingly coming out to evade detection with new iterations of ransomware strains. Is your network successful in blocking ransomware when social engineering attacks fall on employees? The Ransomware Simulator “RanSim” from KnowBe4 gives you a quick look at the efficacy of your current network security. RanSim will simulate 10 scenarios of ransomware infection and show you if a workstation is prone to infection.
- 100% harmless simulation of a real ransomware infection
- Does not use any of your own files
- Tests 10 types of infection scenarios
- Just download the install and run it
↓ 02 – SpyShelter Security Test Tool | Test Windows Security
A non-malicious program that can be used on live systems is the Security Test Tool provided on this page. Installation does not involve it.
This tool simulates the few methods used to steal your data through sophisticated malware. It will not harm your device files, and until the moment you close the program, all collected data will be stored locally on your PC. Check your program for protection and find out if it protects you against malware that steals information. There are 6 different modules in this Security Test Tool.:
- Keylogging test
- Webcam capturing test
- Test Keystroke Encryption
- Screen capturing test
- Clipboard capturing test
- Sound recording test
- System protection test (Registry access, writing file to startup folder, service registering)
↓ 03 – WICAR | Test Browser Security
To verify the correct operation of your anti-virus/anti-malware program, the wicar.org website was designed. The term ‘WICAR’ is derived from the industry standard EICAR anti-virus test file, which is a non-hazardous file flagged or acted upon by all anti-virus products as a true virus and quarantine. The end user or network administrator can ensure that the anti-virus software is running correctly by being able to run a test virus program securely (without utilising a real virus which may damage the system should the anti-virus software fail to function).
The Malware Checks! The page includes commonly abused browser vulnerabilities to test your protections, which you can safely click on. Donations to help with the expenses of logistics and hosting are welcome.
↓ 04 – TESTmyAV | Test Ransomware & Malware
This site contains 100+ real malicious and extremely damaging malware. Get your hands on fresh malware for testing your antivirus software and maybe mutate it yourself with a packer. On TestMyAV.com we’ve got plenty of malware for you to use in your testing. Just go to the malware page and start there. You can also source malware from many other places on the Internet and from your local email spam folders. Whatever you use, you’ll need to handle it carefully to make sure you don’t accidentally infect a machine or let it be scanned prematurely before you’ve started the proper testing.
↓ 05 – EICAR | Simple Antivirus Test
This test file has been given as the “EICAR Standard Anti-Virus Test File” to EICAR for distribution and meets all of the above requirements. Since it is not a virus, it is safe to pass around, and does not contain any viral code fragments. The majority of products react to it as though it were a virus (although they normally report it with an obvious name, such as “EICAR-AV-Test”).
↓ 06 – ShieldUp | Test Windows DNS & Router UPnP Exposure
The Windows networking technology that links your computer to the Internet will deliver any or all of your computer’s data to the entire world at this very moment without your knowledge or express permission! A DNS machine name is associated with several Internet connection IP addresses. The existence of “Reverse DNS,” which enables the machine name to be retrieved from the IP address, can pose a privacy and potential security issue for Internet users as it can recognize your Internet account, and thus you, uniquely and persistently and can reveal other information, such as your geographical location. (But yours is not.)
↓ 07 – FortiGuard | Test Downloadable Zip Compression
Are you protected? It’s about more than just malware these days – attackers bypass antivirus and other detection methods by concealing code with different file types and compressions. Are you at risk? Find out with this easy test. Attackers get past security measures by hiding malware deep within compressed files. Unfortunately, most network security solutions are regularly fooled by this technique because they can’t analyze a file compressed with any format other than ZIP. There are a number of legitimate compression formats commonly used and easily opened by typical end users on most operating systems other than ZIP, such as:
- TAR.GZ – compression which dominates the world of Linux
- 7Z – a fast compression format growing in popularity
- CAB – a standard Windows installer package compression format