Skip to content
  • YouTube
  • TikTok
  • Twitter
  • Instagram

MalwareTech

Everything Cyber Security

  • Sponsors
  • Speaking
  • Content
    • Podcast
    • Challenges
  • Contact
Uncategorized

Fighting Hooks With Hooks – Sandbox Escape

September 17, 2013June 29, 2016

Introduction I was pretty bored today and couldn’t think of an article to write, decided I’d come up with an example of escaping a sandbox.

Read More
Uncategorized

Win64/Vabushky – The Great Code Heist

September 3, 2013June 29, 2016

Introduction This analysis is of a new winlocker dropper that was first seen in the wild last month, the binary is 64 bit, packed with

Read More
Uncategorized

Personal Security – What Can Be Done?

August 25, 2013June 29, 2016

Introduction It’s no secret that keeping your computer free from malware has become much harder. I remember about 12 years ago my friend showing me

Read More
Malware Analysis Reverse Engineering Vulnerability Research

PowerLoader Injection – Something truly amazing

August 13, 2013November 21, 2021

I’m not dead It has been a while since i wrote an article (I’ve been pretty busy in real life), so I decided to get

Read More
News

Carberp source code now leaked

June 24, 2013November 21, 2021

The Bootpocalypse While security blogs are still flooding the internet with the old news of the carberp source going on sale for $50k, I’d like

Read More
News

Carberp source code, days away from full leak

June 22, 2013November 21, 2021

Brief history Carberp was a banking bot that first came up on researchers’ radars in the last part of 2010. By the end of 2011

Read More
Malware Analysis Reverse Engineering Threat Intelligence

Rise of the dual architecture usermode rootkit

June 4, 2013November 21, 2021

A bit about past rootkits In the past it has been very common to see usermode rootkits that only attack one architecture, which has usually

Read More

Posts navigation

Previous 1 … 10 11

  • Twitter

  • Youtube

  • Twitch

  • Discord

  • Instagram

  • RSS
  • Donations




    Categories

    • For Beginners
    • Hacking
    • Malware Analysis
    • News
    • Opinions
    • Personal Stories
    • Reverse Engineering
    • Threat Intelligence
    • Uncategorized
    • Videos
    • Vulnerability Research
    Copyright MalwareTech 2022