PE Smallest Executable
Learn how to modify a portable executable (pe) file to strip all the junk code and keep only the strict minimal bytes to keep it perfectly functional.
DetailsLearn how to modify a portable executable (pe) file to strip all the junk code and keep only the strict minimal bytes to keep it perfectly functional.
DetailsRansomware became the threats of the web. Learn how they work, their effects, and how to protect yourself from such malware.
DetailsQuick approach about Windows Management Instrumentation (WMI). Meet Adware Yeabests, hiding in the WMI and see how RogueKiller takes care of it.
DetailsRunPE: How to hide code behind a legit process – RunPE is a trick used by some malware to hide code into a legit process. Learn how to detect.
DetailsAnlysis of Win32.Symmi Ransomware – Learn how this ransomware encrypts your files, and how to defeat it to decrypt your personal data.
DetailsUserland Rootkits explained. This is the first part of this rootkit writing tutorial in which we will detail the basics about userland rootkits.
DetailsAlpha bay, Silk Road, Hansa: They made the headlines of newspapers for weeks. They were underground markets offering several illicit goods and services and were shut down in 2013 and 2017. All were using Tor, currently the most used parallel Internet network, called Darknet. DARKNET Computers connected to the Internet use the Internet protocol suite…
DetailsComputers worms are designed to leverage vulnerabilities that allow them to gain control over a device then scan the network for other vulnerable devices and so one
Details