PE Smallest Executable
Learn how to modify a portable executable (pe) file to strip all the junk code and keep only the strict minimal bytes to keep it perfectly functional.
DetailsLearn how to modify a portable executable (pe) file to strip all the junk code and keep only the strict minimal bytes to keep it perfectly functional.
DetailsA major increase in the number of malware featuring cryptominers has been observed. Discover the way malware writers make money with them.
DetailsMRF (Malware Repository Framework) V4.2 has been released. Take a look at the awesome new features (and bugfixes) it brings. Try it now!
DetailsRight now, bots are scanning the internet for mongodb database with no password, and open port. Read the following and secure your database now.
DetailsMacro malware are known for decades but still remain the preferred infection method for infecting machines with Ransomware, Trojans, … Learn how it works.
DetailsInfections related to the use of hacktools like Windows Loader or KMSPico are rising. Learn how malware authors use them to spread cryptominers, ransomwares and ultimately take control of your newly installed operating system.
DetailsKernelMode Rootkits explained. This is the third part of this rootkit writing tutorial in which we will detail the basics about kernel rootkits.
Details