Sam ☁️🪵 (@sam0x90) 's Twitter Profile
Sam ☁️🪵

@sam0x90

SOC/Intel | @SANSInstitute | @PacktAuthors packtpub.com/product/purple…
Love #PurpleTeaming #DE #CTI #DFIR

ID: 106853852

calendar_today20-01-2010 22:21:30

2,2K Tweet

1,1K Takipçi

779 Takip Edilen

Justin Ibarra (@br0k3ns0und) 's Twitter Profile Photo

We are now developing Elastic threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉 Can visually explore these with rulexplorer.io! 🔥🔥 #ThreatHunting #DetectionEngineering

We are now developing <a href="/elastic/">Elastic</a> threat hunting queries, alongside our detection rules, and openly sharing these as well! 🎉🎉

Can visually explore these with rulexplorer.io! 🔥🔥

#ThreatHunting #DetectionEngineering
Sam ☁️🪵 (@sam0x90) 's Twitter Profile Photo

Is that a (sub)technique ATT&CK J⩜⃝mie Williams ? "...injects malicious code into...mstsc.exe" "injected code is a shellcode that loads another malicious library... to steal RDP credentials by hooking specific functions of the Windows library “SspiCli.dll”

Michael Koczwara (@michalkoczwara) 's Twitter Profile Photo

Threat Actor is using Gophish to impersonate/target KPMG (financial department). /64.227.171.144 (0/94 VT) /financeekpmg.com (0/VT) Here, we can see how the Threat Actor stayed under the radar by disabling default Gophish features and avoiding being flagged as malicious by

Threat Actor is using Gophish to impersonate/target KPMG (financial department).

/64.227.171.144 (0/94 VT)
/financeekpmg.com (0/VT)

Here, we can see how the Threat Actor stayed under the radar by disabling default Gophish features and avoiding being flagged as malicious by
The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🌟New report out today!🌟 Confluence Exploit Leads to LockBit Ransomware Analysis & reporting completed by Angelo Violetti, mal forsec, & @teddy_ROxPin Audio: Available on Spotify, Apple, YouTube and more! thedfirreport.com/2025/02/24/con…

MalDev Academy (@maldevacademy) 's Twitter Profile Photo

The Offensive Phishing Operations Course has been released. 81 modules are included in the initial launch, with the first update already being worked on. More information: maldevacademy.com/phishing-course Syllabus: maldevacademy.com/phishing-cours…

Sam ☁️🪵 (@sam0x90) 's Twitter Profile Photo

If anyone needs to convert the DarkWebInformer json into csv here is a quick script to properly convert it: github.com/Sam0x90/QuickC…

Sam ☁️🪵 (@sam0x90) 's Twitter Profile Photo

With all the fuss around #velociraptor thought I'd give a shootout to project LOST (LOL Security Tools). We started this together with Ali Hussein some time ago. Yes Velociraptor, osquery, defender, wazuh, and much more that would deserve to be documented 0xanalyst.github.io/Project-Lost/

Renzon (@r3nzsec) 's Twitter Profile Photo

We're hiring DFIR consultants (Senior & Principal) for Germany and KSA here at Unit 42 Germany (must be german speaker) - jobs.smartrecruiters.com/PaloAltoNetwor… KSA (must be arabic speaker) - jobs.smartrecruiters.com/PaloAltoNetwor… Let me know if you have questions. Feel free to DM me ✌🏻#dfir

Sam ☁️🪵 (@sam0x90) 's Twitter Profile Photo

GG Dirk-jan ! I wish to see more of this in the future: "After some testing and filtering with some fellow researchers that work on the blue side we came up with the following detection query" 👏

Elastic Security Labs (@elasticseclabs) 's Twitter Profile Photo

#ElasticSecurityLabs uncovers #RONINGLOADER, a multi-stage loader utilizing signed drivers, PPL abuse, CI Policies, and other evasion techniques to deliver #DragonBreath's gh0st RAT variant. Check it out at ela.st/roningloader

#ElasticSecurityLabs uncovers #RONINGLOADER, a multi-stage loader utilizing signed drivers, PPL abuse, CI Policies, and other evasion techniques to deliver #DragonBreath's gh0st RAT variant. 

Check it out at ela.st/roningloader
MoBustami (@mobustami) 's Twitter Profile Photo

Happy New Year everyone. I wrote something sec0wn.blogspot.com/2026/01/from-n… Do I get an honorary #OSEP for analyzing their payloads? Lol. Maybe Gemini should though. H/T to GeminiPro for the assist

Georgy Kucherin (@kucher1n) 's Twitter Profile Photo

It turned out there are many more payloads used in the Notepad++ attack! To stay undetected, its masterminds were COMPLETELY changing execution chains about every month. Here are more IPs used in the attack: 45.76.155[.]202 45.32.144[.]255 Read below for many other IoCs! [1/8]

It turned out there are many more payloads used in the Notepad++ attack! To stay undetected, its masterminds were COMPLETELY changing execution chains about every month.

Here are more IPs used in the attack:
45.76.155[.]202
45.32.144[.]255

Read below for many other IoCs! [1/8]