Hacker News new | past | comments | ask | show | jobs | submit | from login
CVE-2024-38063 – Remotely Exploiting Windows via IPv6 (malwaretech.com)
2 points by riedel 5 months ago | past
A Realistic Look at Implications of ChatGPT for Cybercrime (malwaretech.com)
3 points by FinnKuhn on Feb 23, 2023 | past | 1 comment
YouTube’s Policy on Hacking Tutorials Is Problematic (2019) (malwaretech.com)
2 points by caaqil on Jan 25, 2022 | past
An in-depth look at hacking back, active defense, and cyber letters of marque (malwaretech.com)
4 points by yabones on Nov 17, 2021 | past
I Found My First Ever ZeroDay (In RDP) (malwaretech.com)
2 points by ashurov on Jan 15, 2021 | past
Marcus Hutchins – How I Found My First Ever ZeroDay (In RDP) (malwaretech.com)
4 points by pgrote on Jan 3, 2021 | past
I Found My First Ever ZeroDay (In RDP) (malwaretech.com)
2 points by mtlynch on Jan 1, 2021 | past
DejaBlue: Analyzing a RDP Heap Overflow (malwaretech.com)
1 point by ga-vu on Aug 20, 2019 | past
Analysis of CVE-2019-0708 (BlueKeep) (malwaretech.com)
18 points by WalterSobchak on June 1, 2019 | past
Public Statement (malwaretech.com)
1 point by Gaelan on April 19, 2019 | past
Video: First Look at Ghidra (NSA Reverse Engineering Tool) (malwaretech.com)
1 point by zahllos on March 12, 2019 | past
Best Languages to Learn for Malware Analysis (malwaretech.com)
2 points by neiesc on Oct 27, 2018 | past
Beginner Malware Reversing Challenges – MalwareTech (malwaretech.com)
1 point by dsr12 on June 25, 2018 | past
Best Programming Languages to Learn for Malware Analysis (malwaretech.com)
3 points by p0peax on March 19, 2018 | past | 1 comment
Creating a Simple Free Malware Analysis Environment (malwaretech.com)
1 point by mikehotel on Nov 7, 2017 | past
Petya Ransomware Attack – What’s Known (malwaretech.com)
1 point by spurlock on June 28, 2017 | past
Petya Ransomware Attack – What’s Known (malwaretech.com)
2 points by okket on June 27, 2017 | past
Live global map of WannaCry infections checking in (malwaretech.com)
3 points by InternetUser on May 17, 2017 | past | 2 comments
WannaCrypt Tracker (malwaretech.com)
2 points by rbc on May 15, 2017 | past
Accidentally Stopping a Global Cyber Attack (malwaretech.com)
1981 points by pradeepchhetri on May 13, 2017 | past | 338 comments
Exploring Peer to Peer Botnets (malwaretech.com)
2 points by borisjabes on May 12, 2017 | past
WCrypt Ransomware Worm Infects 45k+ in under 24 hours (malwaretech.com)
2 points by oomkiller on May 12, 2017 | past
MalwareTech Botnet Tracker (malwaretech.com)
1 point by swatkat on May 8, 2017 | past
Get your own copy of the Dridex malware (malwaretech.com)
1 point by j_s on Feb 15, 2017 | past
Mapping Mirai: A Botnet Case Study (malwaretech.com)
1 point by r721 on Oct 4, 2016 | past
Surviving reformats by infecting the hard disk firmware (malwaretech.com)
64 points by graystevens on June 4, 2015 | past | 34 comments
Bootkit Disk Forensics – Part 2 (malwaretech.com)
5 points by JoachimS on March 7, 2015 | past
Bootkit Disk Forensics – Part 1 (malwaretech.com)
26 points by JoachimS on March 7, 2015 | past
RIG Exploit Kit – Source Code Leak (malwaretech.com)
1 point by pmalynin on Feb 15, 2015 | past
Coding Malware for Fun and Not for Profit (Because that would be illegal) (malwaretech.com)
2 points by lelf on April 12, 2014 | past

Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: