Faraday (@0xffaraday) 's Twitter Profile
Faraday

@0xffaraday

Security Analyst @Huntresslabs
SGF2ZSBhIG5pY2UgZGF5IQ==

ID: 1528617817767129089

calendar_today23-05-2022 06:04:32

10 Tweet

37 Followers

87 Following

Aura (@securityaura) 's Twitter Profile Photo

"svchost.exe should always have services.exe as a parent process and should never be launched without any arguments/parameters" Welcome to the real world.

"svchost.exe should always have services.exe as a parent process and should never be launched without any arguments/parameters"

Welcome to the real world.
TrustedSec (@trustedsec) 's Twitter Profile Photo

Who says #Python Malware is out of style? In our new #blog,kevin revisits an old technique he believes is a prime candidate to host #malware payloadsโ€”Python for Windows. Read it now! hubs.la/Q033Jvyq0

RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ (@russianpanda9xx) 's Twitter Profile Photo

Happy Friday, everyone! With recent changes in #LummaStealer - using ChaCha20 for C2 encryption, here is the new config extractor in C/C++. We will try a different approach this time ๐Ÿฆ Enjoy! github.com/RussianPanda95โ€ฆ

Happy Friday, everyone! With recent changes in #LummaStealer - using ChaCha20 for C2 encryption, here is the new config extractor in C/C++. We will try a different approach this time ๐Ÿฆ
Enjoy!  
github.com/RussianPanda95โ€ฆ
ACE Responder (@aceresponder) 's Twitter Profile Photo

Windows audit policies, some common events they enable, and the volume of events they produce. #ThreatHunting #DFIR #Cybersecurity

Windows audit policies, some common events they enable, and the volume of events they produce.

#ThreatHunting #DFIR #Cybersecurity
Wietze (@wietze) 's Twitter Profile Photo

ATT&CK v17 is out! It contains an update I have campaigned for since 2022: DLL Hijacking is now a single sub-technique, merging Search Order Hijacking & Sideloading, plus supporting related techniques. Huge thanks & congrats to the @MitreATTACK team on this release ๐ŸŽ‰

ATT&CK v17 is out! It contains an update I have campaigned for since 2022: DLL Hijacking is now a single sub-technique, merging Search Order Hijacking & Sideloading, plus supporting related techniques.

Huge thanks & congrats to the @MitreATTACK team on this release ๐ŸŽ‰
Anton (@antonlovesdnb) 's Twitter Profile Photo

Got a new Huntress blog out today taking a look at some intrusion analysis methodology with practical examples - check it out! huntress.com/blog/intrusionโ€ฆ

Malware Village (@malwarevillage) 's Twitter Profile Photo

That wraps up #MalwareVillage @DEFCON 33! ๐Ÿฅณ Special thanks to all the organizers, sponsors, volunteers, speakers, workshoppers, collaborators, attendees, and everyone involved, for making this event absolutely legendary! ๐Ÿคฉ Thank you all! ๐Ÿ™

That wraps up #MalwareVillage
@DEFCON 33! ๐Ÿฅณ

Special thanks to all the organizers, sponsors, volunteers, speakers, workshoppers, collaborators, attendees, and everyone involved, for making this event absolutely legendary! ๐Ÿคฉ

Thank you all! ๐Ÿ™