Daniel Chun (@chunderstruck) 's Twitter Profile
Daniel Chun

@chunderstruck

IR Consultant @mandiant a Google Cloud Company #DFIR
Opinions are my own

ID: 142961291

calendar_today12-05-2010 06:02:09

452 Tweet

255 Followers

1,1K Following

sam lau (@samlau95) 's Twitter Profile Photo

hello world! we're launching pandas tutor! it visualizes Python pandas code step-by-step: pandastutor.com (developed with my advisor philip guo)

Nasreddine Bencherchali (@nas_bench) 's Twitter Profile Photo

#log4j thread Detection Ideas + Yara by Florian Roth ⚡️ - gist.github.com/Neo23x0/e4c8b0… Hashes for vulnerable LOG4J versions by Rob Fuller - github.com/mubix/CVE-2021… SIGMA by SOC Prime - tdm.socprime.com/tdm/info/XY2Ej… tdm.socprime.com/tdm/info/4SiOs… Payloads list by GreyNoise - gist.github.com/nathanqthai/01…

KringleCon (@kringlecon) 's Twitter Profile Photo

⚠️ Breaking! ⚠️ By popular demand, we've launched one offensive and one defensive #Log4j challenge! Follow the signs to the challenges, located right near the North Pole. #HolidayHack

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

Been slowly adding small programs that help me when teaching malware analysis - most programs in c/c++ 👓 github.com/jstrosch/learn… Example, a program that implements the PEB-walking technique to resolve imports. github.com/jstrosch/learn… 👇

Been slowly adding small programs that help me when teaching malware analysis - most programs in c/c++

👓 github.com/jstrosch/learn…

Example, a program that implements the PEB-walking technique to resolve imports.

github.com/jstrosch/learn…

👇
ekt0 (@ektoplasma_) 's Twitter Profile Photo

Today we are very proud to release IRIS: github.com/dfir-iris/iris…. It is a collaborative platform designed for and by IR analysts. Developed and used by the Airbus Defence and Space Cyber CSIRT (special mention to the main dev, WhiteKernel). 1/4

Daniel Chun (@chunderstruck) 's Twitter Profile Photo

I completed the Slot Machine Scrutiny challenge! holidayhackchallenge.com Don't miss out on SANS #HolidayHack x KringleCon holidayhackchallenge.com

CactusCon (@cactuscon) 's Twitter Profile Photo

Join us on Saturday, Feb 5 with Joe G presenting: Reversing DLLs To really dig into the inner workings of DLLs and how to reverse them. Check details at cactuscon.com/cc10-schedule and register: cactuscon.com/cc10

Join us on Saturday, Feb 5 with <a href="/GironSec/">Joe G</a> presenting:

Reversing DLLs

To really dig into the inner workings of DLLs and how to reverse them. Check details at cactuscon.com/cc10-schedule and register: cactuscon.com/cc10
John Hammond (@_johnhammond) 's Twitter Profile Photo

PicoCTF 2022 starts today and I am STOKED! Seriously one of my favorite beginner-friendly cybersecurity games, with a great trajectory to ramp up some pretty tough stuff! GO PLAY picoctf.com

Daniel Chun (@chunderstruck) 's Twitter Profile Photo

What kind of computer or cyber security class should I try and teach middle/high schoolers? Taught a class going through the "Invent Games with Python" book this year. Thought about going through #HolidayHackChallenge but might be too difficult...

Jenny (@4n6assassin) 's Twitter Profile Photo

Today, Mandiant released a new blog: Old Services, New Tricks: Cloud Metadata Abuse by UNC2903 Mandiant discusses abuse and exploitation of services hosted in Amazon Web Services (AWS) and similar cloud platforms carried out by UNC2903. Check it out! mandiant.com/resources/clou…

Gigs @ Shmoo (@gigs_security) 's Twitter Profile Photo

Good morning, hope you’ve had your breakfast 🥣 Have you ever looked at your #Azure Serial connections? Did you know about them? Well, Serial is part of a well balanced attack for UNC3944. Mandiant (part of Google Cloud) #Intel and #consulting dropped another 🔥 blog! 🔗: mandiant.com/resources/blog…

Daniel Chun (@chunderstruck) 's Twitter Profile Photo

Took my kid to DEF CON he had tons of fun seeing what people were doing. He showed some people how to pick locks and had laughs rickrolling people with his flipper. The goons and others took great care of him. He definitely wants to come back.

Took my kid to <a href="/defcon/">DEF CON</a> he had tons of fun seeing what people were doing. He showed some people how to pick locks and had laughs rickrolling people with his flipper. The goons and others took great care of him. He definitely wants to come back.
Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

I did a thing! I created my first GPT named "MagicUnprotect". This GPT is connected to the #UnprotectProject knowledgebase. You can ask anything related to evasion techniques! I'll share it when the test is done 🤓 #infosec #malware Jean-Pierre LESUEUR

I did a thing! I created my first GPT named "MagicUnprotect". This GPT is connected to the #UnprotectProject knowledgebase. You can ask anything related to evasion techniques! I'll share it when the test is done 🤓 #infosec #malware <a href="/DarkCoderSc/">Jean-Pierre LESUEUR</a>
Moritz (@m_r_tz) 's Twitter Profile Photo

Happening right now (open till Sat, 2/21/26)! A week-long CTF dedicated exclusively to reverse engineering. Hosted by crackmes.one, inspired by the legendary Flare-On Challenge. crackmesone.ctfd.io