A forum for reverse engineering, OS internals and malware analysis 

 #17835  by septicshock
 Thu Jan 24, 2013 7:52 am
Hello,

I would like to unpack and analyse some of the current 2013 Rogue Antimalware tools.
By current I mean the system to purchase licenses is still up and running as well as all the other components.

I frequent lists of malware domains such as malc0de.com/database but I am having trouble finding any rogue antimalware tools that are current.
Could anyone provide me with other places to get this stuff or tips such as search terms for hijacked websites, lists of recently registered domains affiliated with malware.


Thanks for your time.