Andreasitc (@andreas_nds) 's Twitter Profile
Andreasitc

@andreas_nds

Interested in infosec; Fan of tryhackme, hackthebox and pentesterlab. Always learning and trying to get better. Opinions are my own. he/him

ID: 835116105148600320

calendar_today24-02-2017 13:16:09

510 Tweet

86 Followers

1,1K Following

Piyush Itankar (@_streetdogg) 's Twitter Profile Photo

By the end of this series, you'll know everything about ARM M CPUs, be able to boot them from scratch and have a very good idea about how tasks scheduling works. Fun part - Everything will be written from scratch in assembly. No IDE, no Libraries, no frameworks... nothing. Just

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

To date, I have published 15 articles (1045 pages) with the strict goal of helping the cybersecurity community. ERS (439 pages, so far): [+] ERS 05: exploitreversing.com/2025/03/12/exp… [+] ERS 04: exploitreversing.com/2025/02/04/exp… [+] ERS 03: exploitreversing.com/2025/01/22/exp… [+] ERS 02:

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🚨 New Jupyter Notebook just added to the Juniverse! It allows you to generate a STIX graph from a scraped threat report. Great work by Antonio Formato 🤩 Check this out 👉 juniverse.securitybreak.io

🚨 New Jupyter Notebook just added to the Juniverse! It allows you to generate a STIX graph from a scraped threat report. Great work by <a href="/anformato/">Antonio Formato</a> 🤩

Check this out 👉 juniverse.securitybreak.io
Uriel Kosayev (@malfuzzer) 's Twitter Profile Photo

🚨 Win a FREE seat to our exclusive **EDR Internals, Research & Development** live online workshop! 🚀 Dive deep into EDR systems with expert-led training. Follow, like & share this post to enter! 🎉 Don’t miss out—secure your spot now! 👉 trainsec.net/courses/edr-in… #Cybersecurity

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

I will be streaming a portion of the SANS SEC660 course I'm teaching today in DC on Introduction to Windows Exploit Development. We will use ROP to get around DEP on Windows 11. 1PM PT youtube.com/watch?v=cbIEwz…

Greg Lesnewich (@greglesnewich) 's Twitter Profile Photo

the biggest skill jump I took with yara was to think how the bytes within a file relate to one another Malware isn’t a monolith - it’s a composite of bytes, and those bytes have to work together to do their job. we can exploit those unique relations to track em

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

So far, I have already written 15 articles (1045 pages), which have been published on my blog: blog: exploitreversing.com ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): [+] ERS 05: exploitreversing.com/2025/03/12/exp… [+] ERS 04:

So far, I have already written 15 articles (1045 pages), which have been published on my blog:

blog: exploitreversing.com

ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): 

[+] ERS 05: exploitreversing.com/2025/03/12/exp…
[+] ERS 04:
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

I’m using this on a set of web servers. THOR Cloud runs daily scans, and if a web shell or reverse shell gets dropped, I get an alert in Slack - no manual checks needed. Here’s how to set this up yourself 👇 How to get notified shortly after a web shell lands on one of your

I’m using this on a set of web servers.

THOR Cloud runs daily scans, and if a web shell or reverse shell gets dropped, I get an alert in Slack - no manual checks needed.

Here’s how to set this up yourself 👇

How to get notified shortly after a web shell lands on one of your
RevistaOccam'sRazor (@revistaroor) 's Twitter Profile Photo

Very happy to announce that "Heavy Wizardry 101" has entered the Early Access program No Starch Press The books introduces you in the world of #LowLevel #Programming and #SystemProgramming in #C and #ASM . nostarch.com/heavy-wizardry…

hasherezade (@hasherezade) 's Twitter Profile Photo

Updated #PEsieve / #HollowsHunter / #MalUnpack: github.com/hasherezade/pe… / github.com/hasherezade/ho… / github.com/hasherezade/ma… - check them out 💙

Updated #PEsieve / #HollowsHunter / #MalUnpack: github.com/hasherezade/pe… / github.com/hasherezade/ho… / github.com/hasherezade/ma… - check them out 💙
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

If you're interested in learning more about time-travel debugging (TTD), consider joining my upcoming webinar with VirusTotal. You can register here: brighttalk.com/webcast/7451/6… Going to cover some basics from my recent blog :) cloud.google.com/blog/topics/th…

Xeno Kovah (@xenokovah) 's Twitter Profile Photo

#OST2 has a ton of material relevant to RE. And our ost2.fyi/Dbg1101 introduction to IDA as a debugger class instructor, Christina Johns bitmaize, is working on "RE2001: Introductory Static Analysis of C-based programs", which will unlock many new classes!

Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

Beyond stoked to get a signed copy of Jaron’s new book, "Threat Hunting macOS" 📚😍 Jaron is one of the go-to voices in macOS threat hunting & malware research, so do yourself a favor and grab a copy: themittenmac.com/threat-hunting…

Beyond stoked to get a signed copy of Jaron’s new book, "Threat Hunting macOS" 📚😍

Jaron is one of the go-to voices in macOS threat hunting &amp; malware research, so do yourself a favor and grab a copy: themittenmac.com/threat-hunting…
Dan (@_xdanx) 's Twitter Profile Photo

Open Klara released - your own private cloud Yara scanner! Together with our community member Gajesh, I would like to announce the fork of the KLara project into Open Klara! We aim to maintain, support and fix future bugs. Open KLara is a community-driven fork of the original

Karsten Hahn (@struppigel) 's Twitter Profile Photo

🦔 📹 New Video: Can office files be malicious without Macros? ➡️ VSTO Add-Ins ➡️ External Templates ➡️ Checklist for Office analysis #MalwareAnalysisForHedgehogs youtube.com/watch?v=RtHHck…

Costin Raiu (@craiu) 's Twitter Profile Photo

Test your YARA rules against pagefile.sys collected from a dozen systems. Make sure there are no false positives. People doing IR will thank you 🙏👍

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

We’ve all heard the proposition: "Replace your frontline with LLMs to save costs." But is it actually a good strategy? In the latest episode of Behind the Binary, Kevin Harris explains why this is the worst possible place for automation. 🔥 "I have heard many times about how