www.malwaretech.com
Open in
urlscan Pro
2606:4700:10::6814:4f37
Public Scan
Submitted URL: http://malwaretech.com/
Effective URL: https://www.malwaretech.com/
Submission: On April 24 via manual from NL — Scanned from NL
Effective URL: https://www.malwaretech.com/
Submission: On April 24 via manual from NL — Scanned from NL
Form analysis
2 forms found in the DOMGET https://www.malwaretech.com/
<form role="search" method="get" class="search-form" action="https://www.malwaretech.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
GET https://www.malwaretech.com/
<form role="search" method="get" class="search-form" action="https://www.malwaretech.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
Text Content
Skip to content Search for: * YouTube * TikTok * Twitter * Instagram MALWARETECH Everything Cyber Security * * Sponsors * Speaking * Content * Podcast * Challenges * Contact Videos [VIDEO] EXPLOITING WINDOWS RPC – CVE-2022-26809 EXPLAINED | PATCH ANALYSIS April 23, 2022April 23, 2022 Walking through my process of how I use patch analysis and reverse engineering to find vulnerabilities, then evaluate the risk and exploitability of bugs. Read More Opinions AN IN-DEPTH LOOK AT HACKING BACK, ACTIVE DEFENSE, AND CYBER LETTERS OF MARQUE November 17, 2021 There has been much discussion in cyber security about the possibility of enabling the private sector to engage in active cyber defense, or colloquially “hacking Read More Vulnerability Research HOW I FOUND MY FIRST EVER ZERODAY (IN RDP) December 31, 2020January 1, 2021 Up until recently, I’d never tried the bug hunting part of vulnerability research. I’ve been reverse engineering Windows malware for over a decade, and I’d Read More Vulnerability Research BLUEKEEP: A JOURNEY FROM DOS TO RCE (CVE-2019-0708) September 6, 2019September 7, 2019 Due to the serious risk of a BlueKeep based worm, I’ve held back this write-up to avoid advancing the timeline. Now that a proof-of-concept for Read More Vulnerability Research DEJABLUE: ANALYZING A RDP HEAP OVERFLOW August 19, 2019August 20, 2019 In August 2019 Microsoft announced it had patched a collection of RDP bugs, two of which were wormable. The wormable bugs, CVE-2019-1181 & CVE-2019-1182 affect Read More Opinions YOUTUBE’S POLICY ON HACKING TUTORIALS IS PROBLEMATIC July 3, 2019July 5, 2019 Recently YouTube changed its policy on “hacking” tutorials to an essential blanket ban. In the past, such content was occasionally removed under YouTube’s broad “Harmful Read More Vulnerability Research ANALYSIS OF CVE-2019-0708 (BLUEKEEP) May 31, 2019September 11, 2019 I held back this write-up until a proof of concept (PoC) was publicly available, as not to cause any harm. Now that there are multiple Read More Vulnerability Research ANALYSIS OF A VB SCRIPT HEAP OVERFLOW (CVE-2019-0666) April 2, 2019April 3, 2019 Anyone who uses RegEx knows how easy it is to shoot yourself in the foot; but, is it possible to write RegEx so badly that Read More Reverse Engineering VIDEO: FIRST LOOK AT GHIDRA (NSA REVERSE ENGINEERING TOOL) March 6, 2019March 6, 2019 Today during RSA Conference, the National Security Agency release their much hyped Ghidra reverse engineering toolkit. Described as “A software reverse engineering (SRE) suite of Read More Vulnerability Research ANALYZING A WINDOWS DHCP SERVER BUG (CVE-2019-0626) March 1, 2019April 3, 2019 Today I’ll be doing an in-depth write up on CVE-2019-0626, and how to find it. Due to the fact this bug only exists on Windows Read More POSTS NAVIGATION 1 2 … 11 Next Search for: DONATIONS Donate Donate Donate CATEGORIES * For Beginners * Hacking * Malware Analysis * News * Opinions * Personal Stories * Reverse Engineering * Threat Intelligence * Uncategorized * Videos * Vulnerability Research Copyright MalwareTech 2022 CryptoDonatex