www.malwaretech.com Open in urlscan Pro
2606:4700:10::6814:4f37  Public Scan

Submitted URL: http://malwaretech.com/
Effective URL: https://www.malwaretech.com/
Submission: On April 24 via manual from NL — Scanned from NL

Form analysis 2 forms found in the DOM

GET https://www.malwaretech.com/

<form role="search" method="get" class="search-form" action="https://www.malwaretech.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

GET https://www.malwaretech.com/

<form role="search" method="get" class="search-form" action="https://www.malwaretech.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Text Content

Skip to content
Search for:
 * YouTube
 * TikTok
 * Twitter
 * Instagram


MALWARETECH

Everything Cyber Security

 * 
 * Sponsors
 * Speaking
 * Content
   * Podcast
   * Challenges
 * Contact
   

Videos


[VIDEO] EXPLOITING WINDOWS RPC – CVE-2022-26809 EXPLAINED | PATCH ANALYSIS

April 23, 2022April 23, 2022

Walking through my process of how I use patch analysis and reverse engineering
to find vulnerabilities, then evaluate the risk and exploitability of bugs.

Read More
Opinions


AN IN-DEPTH LOOK AT HACKING BACK, ACTIVE DEFENSE, AND CYBER LETTERS OF MARQUE

November 17, 2021

There has been much discussion in cyber security about the possibility of
enabling the private sector to engage in active cyber defense, or colloquially
“hacking

Read More
Vulnerability Research


HOW I FOUND MY FIRST EVER ZERODAY (IN RDP)

December 31, 2020January 1, 2021

Up until recently, I’d never tried the bug hunting part of vulnerability
research. I’ve been reverse engineering Windows malware for over a decade, and
I’d

Read More
Vulnerability Research


BLUEKEEP: A JOURNEY FROM DOS TO RCE (CVE-2019-0708)

September 6, 2019September 7, 2019

Due to the serious risk of a BlueKeep based worm, I’ve held back this write-up
to avoid advancing the timeline. Now that a proof-of-concept for

Read More
Vulnerability Research


DEJABLUE: ANALYZING A RDP HEAP OVERFLOW

August 19, 2019August 20, 2019

In August 2019 Microsoft announced it had patched a collection of RDP bugs, two
of which were wormable. The wormable bugs, CVE-2019-1181 & CVE-2019-1182 affect

Read More
Opinions


YOUTUBE’S POLICY ON HACKING TUTORIALS IS PROBLEMATIC

July 3, 2019July 5, 2019

Recently YouTube changed its policy on “hacking” tutorials to an essential
blanket ban. In the past, such content was occasionally removed under YouTube’s
broad “Harmful

Read More
Vulnerability Research


ANALYSIS OF CVE-2019-0708 (BLUEKEEP)

May 31, 2019September 11, 2019

I held back this write-up until a proof of concept (PoC) was publicly available,
as not to cause any harm. Now that there are multiple

Read More
Vulnerability Research


ANALYSIS OF A VB SCRIPT HEAP OVERFLOW (CVE-2019-0666)

April 2, 2019April 3, 2019

Anyone who uses RegEx knows how easy it is to shoot yourself in the foot; but,
is it possible to write RegEx so badly that

Read More
Reverse Engineering


VIDEO: FIRST LOOK AT GHIDRA (NSA REVERSE ENGINEERING TOOL)

March 6, 2019March 6, 2019

Today during RSA Conference, the National Security Agency release their much
hyped Ghidra reverse engineering toolkit. Described as  “A software reverse
engineering (SRE) suite of

Read More
Vulnerability Research


ANALYZING A WINDOWS DHCP SERVER BUG (CVE-2019-0626)

March 1, 2019April 3, 2019

Today I’ll be doing an in-depth write up on CVE-2019-0626, and how to find it.
Due to the fact this bug only exists on Windows

Read More


POSTS NAVIGATION

1 2 … 11 Next
Search for:
















DONATIONS

Donate
Donate
Donate







CATEGORIES

 * For Beginners
 * Hacking
 * Malware Analysis
 * News
 * Opinions
 * Personal Stories
 * Reverse Engineering
 * Threat Intelligence
 * Uncategorized
 * Videos
 * Vulnerability Research

Copyright MalwareTech 2022

CryptoDonatex