Exploit Archives - The Tech Revolutionist
BoundHook – Exception Based Kernel-Controlled UserMode Hooking

BoundHook – Exception Based Kernel-Controlled UserMode Hooking   Author: Kasif Dekel, Security Researcher at CyberArk Prologue In this article, we’ll present a new hooking technique that we have found during our research work. Hooking techniques give you control over the…

Petya ransomware: What we know, and the rise of Ransomware-as-a-service (RaaS)

The Petya variant of ransomware utilizes a similar, if not somewhat modified, version of EternalBlue exploit—as used by the Wannacry ransomware in May this year—to spread to all active end-points on the affected network. What is Petya, and how does…

"By Tech Enthusiasts, For Tech Enthusiasts".

The Tech Revolutionist was established in 2012 to bring the latest news from the PC DIY scene to the readers in Singapore. We have now expanded into many other areas in technology, covering a wide scope of topics from lifestyle consumer to enterprise products.

Forget about pretty faces and handsome presenters. Here at The Tech Revolutionist, we go deep into technology to look at how things work, and how it affects the society today.

That's why, our writers are all professionals in the tech industry.

"Think Tech. Speak Tech. Breathe Tech"