Cyber Ghost (@cyberghost13337) 's Twitter Profile
Cyber Ghost

@cyberghost13337

Hacker - Reverse Engineer - Malware Analyst - PWN lover
cyberghost13337.github.io

ID: 1700999660461273088

calendar_today10-09-2023 22:28:42

83 Tweet

57 Takipçi

885 Takip Edilen

Cyber Ghost (@cyberghost13337) 's Twitter Profile Photo

Ele geçirilmiş bir Türk inşaat sitesi Lumma stealer yayıyor. Geçenlerede R10da da bir gönderide görmüştüm, bazı geliştiriciler bu trick'e düşüyor, önlem almakta fayda var x.com/CyberGhost1333…

Blackstorm Security (@blackstormsecbr) 's Twitter Profile Photo

Lifting Binaries, Part 0: Devirtualizing VMProtect and Themida: It's Just Flattening: nac-l.github.io/2025/01/25/lif… #reverseengineering #cybersecurity #vmprotect #informationsecurity #infosec #binary #malwareanalysis #packers

Lifting Binaries, Part 0: Devirtualizing VMProtect and Themida: It's Just Flattening:

nac-l.github.io/2025/01/25/lif…

#reverseengineering #cybersecurity #vmprotect #informationsecurity #infosec #binary #malwareanalysis #packers
CryptoCat (@_cryptocat) 's Twitter Profile Photo

6 months after moving my gitbook to my own domain (book.cryptocat.me), Google still refuses to index it or *any* of the hundreds of writeups I've published over the past ~5 years 😞

Cyber Ghost (@cyberghost13337) 's Twitter Profile Photo

Güzel bir CTI sitesi: malpulse.com x.com/malpulse USOM verilerini pivoting yaparak daha USOM'a girmeden açığa çıkarıyor. Yapımcısının eline sağlık

0x6rss (@0x6rss) 's Twitter Profile Photo

hi threat hunters and malware analysts! I’ve shared my new C2 hunting, reporting, and visualization tool, "Keklick," on github! It helps you discover and manage potential domains/IPs related to C2 infrastructure. Happy hunting! keklick: github.com/0x6rss/keklick

ö (@r0keb) 's Twitter Profile Photo

Good Morning! Just published a blog post diving into Windows Kernel LFH exploitation in the latest Windows 24h2 build, Focusing on controlled allocations to achieve arbitrary read/write in the kernel. r0keb.github.io/posts/Modern-(…

𐰚𐰼𐰇𐱅 (@ynsmroztas) 's Twitter Profile Photo

🚨 New Tool Drop! 📱 Android Native Scanner — automatically detects RCE, tokens, API keys, URLs & base64 payloads inside .so files! 🔍 Features: 🧨 system, exec, popen → RCE scoring 🔐 API key / token / JWT detection 🌍 Extracts hardcoded URLs & endpoints 🧬 JNI & native

🚨 New Tool Drop!

📱 Android Native Scanner — automatically detects RCE, tokens, API keys, URLs & base64 payloads inside .so files!

🔍 Features:
🧨 system, exec, popen → RCE scoring
🔐 API key / token / JWT detection
🌍 Extracts hardcoded URLs & endpoints
🧬 JNI & native
Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

More news coming to you from the soon-to-be-released IDA 9.2: we're taking the first step toward making development on top of #IDA more accessible—by open-sourcing the C++ SDK and IDAPython: eu1.hubs.ly/H0m1XKc0 #ReverseEngineering #DevTools #Infosec #Cybersecurity

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

So far, I have already written 15 articles (1045 pages), which have been published on my blog: blog: exploitreversing.com ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): [+] ERS 05: exploitreversing.com/2025/03/12/exp… [+] ERS 04:

So far, I have already written 15 articles (1045 pages), which have been published on my blog:

blog: exploitreversing.com

ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): 

[+] ERS 05: exploitreversing.com/2025/03/12/exp…
[+] ERS 04:
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

The 12th Annual Flare-On Challenge kicks off Sept 26 at 8PM EST! Reverse engineering pros, from Windows to Web3 (with a YARA twist), it's your time to shine. 🏆 Get ready → bit.ly/4ofb5g8 #FlareOn12

The 12th Annual Flare-On Challenge kicks off Sept 26 at 8PM EST!

Reverse engineering pros, from Windows to Web3 (with a YARA twist), it's your time to shine. 🏆

Get ready → bit.ly/4ofb5g8

#FlareOn12