Author: MalwareTech
Performing a root cause analysis and building proof-of-concept for the recent August 2024 CVSS 9.0 TCP/IP RCE vulnerability
Evading user mode EDR hooks by hijacking the AppVerifier layer
Abusing exception handlers to hook and bypass user mode EDR hooks.
Understanding the basics of user mode EDR hooking, common bypass techniques, and their limitations.
Phishing awareness can be a powerful security tool, or a complete disaster. It all hinges on how you implement it.
Analyzing ChatGPT's capabilities and various claims about how it will revolutionize cybercrime.
An analysis of the threat posed by TikTok and why we need to weigh our options carefully.
An analysis of the threat posed by TikTok and why we need to weigh our options carefully.
An introduction to Use-After-Free exploitation and walking through one of my old challenges. Challenge Info: https://www.malwaretech.com/challenges/windows-exploitation/user-after-free-1-0 Download Link: https://malwaretech.com/downloads/challenges/UserAfterFree2.0.rar Password: MalwareTech
The post [Video] Introduction to Use-After-Free Vulnerabilities | UserAfterFree Challenge Walkthrough (Part: 1) appeared first on MalwareTech.