Max 'Libra' Kersten(@Libranalysis) 's Twitter Profileg
Max 'Libra' Kersten

@Libranalysis

Malware analyst and reverse engineer, author of the Binary Analysis Course. DMs are always open. Opinions are my own and not the views of my employer.

ID:1014590600652447744

linkhttps://maxkersten.nl calendar_today04-07-2018 19:23:44

624 Tweets

3,1K Followers

350 Following

Max 'Libra' Kersten(@Libranalysis) 's Twitter Profile Photo

My DotNet Analysis Workshop at Botconf yesterday went great! Attendees were really interested, and made it an interactive experience all around! I want to thank Trellix for supporting this and allowing me to work on this!

My DotNet Analysis Workshop at @Botconf yesterday went great! Attendees were really interested, and made it an interactive experience all around! I want to thank @Trellix for supporting this and allowing me to work on this!
account_circle
Max 'Libra' Kersten(@Libranalysis) 's Twitter Profile Photo

The actor behind the Kuiper ransomware tried to sell their source code on XSS, and subsequently got banned for breaking the rules. To provide proof of their ransomware's capabilities, they linked to the blog I wrote for Trellix

The actor behind the Kuiper ransomware tried to sell their source code on XSS, and subsequently got banned for breaking the rules. To provide proof of their ransomware's capabilities, they linked to the blog I wrote for @Trellix
account_circle
Max 'Libra' Kersten(@Libranalysis) 's Twitter Profile Photo

Gave a Ghidra & Golang reversing workshop earlier this week at De Haagse Hogeschool / THUAS for Trellix. The students were enthusiastic and had plenty of questions. Thoroughly enjoyed it!

Gave a Ghidra & Golang reversing workshop earlier this week at @dehaagse for @Trellix. The students were enthusiastic and had plenty of questions. Thoroughly enjoyed it!
account_circle
Max 'Libra' Kersten(@Libranalysis) 's Twitter Profile Photo

The second entry in my Ghidra series provides background information on the recently released BSim feature: maxkersten.nl/2024/03/31/ghi…

account_circle
Max 'Libra' Kersten(@Libranalysis) 's Twitter Profile Photo

Last week, I represented Trellix at Fontys' cyber security minor with my Ghidra 101 workshop! It was an absolute blast, with motivated students all around!

Last week, I represented @Trellix at @Fontys' cyber security minor with my Ghidra 101 workshop! It was an absolute blast, with motivated students all around!
account_circle
Max 'Libra' Kersten(@Libranalysis) 's Twitter Profile Photo

RansomHouse is an active ransomware gang. In my most recent blog for Trellix Advanced Research Center, together with PhD. Phuc and in collaboration with Northwave. Intelligent Security Operations., we wrote about the ransomware spreading tool that's been used, along with a ransomware negotiation: trellix.com/blogs/research…

account_circle
Max 'Libra' Kersten(@Libranalysis) 's Twitter Profile Photo

Based on this, I updated the Trellix Advanced Research Center Ghidra script to locally use this JSON file. Additionally, I wrote a script to query the Malpedia web service via the exposed API, which one can also host locally. The Ghidra scripts can be found here: github.com/advanced-threa…

account_circle
Max 'Libra' Kersten(@Libranalysis) 's Twitter Profile Photo

The most recent Ghidra update by NSA Cyber allows one to use fuzzy function recognition. The documentation along with it is of great use: github.com/NationalSecuri…

account_circle
Max 'Libra' Kersten(@Libranalysis) 's Twitter Profile Photo

The Akira ransomware is actively used. In my most recent blog for Trellix, written with Valthek, we dive into the group's background, victimology, and TTPs: trellix.com/about/newsroom…

account_circle
Max 'Libra' Kersten(@Libranalysis) 's Twitter Profile Photo

Great to see the community share SHAREM, the framework where Dr. Bramwell spoke about at DEFCON, where I also spoke about my Ghidra script addition to the framework: github.com/advanced-threa…

account_circle