Dominik Phillips (@dphillips__) 's Twitter Profile
Dominik Phillips

@dphillips__

ID: 1101482508175200258

calendar_today01-03-2019 14:01:09

584 Tweet

101 Followers

231 Following

Outflank (@outflanknl) 's Twitter Profile Photo

Let's play peekaboo with PatchGuard! Read our blog post about hiding processes on modern Windows systems with HVCI enabled: outflank.nl/blog/2026/01/0…

Let's play peekaboo with PatchGuard! Read our blog post about hiding processes on modern Windows systems with HVCI enabled:
outflank.nl/blog/2026/01/0…
Binni Shah (@binitamshah) 's Twitter Profile Photo

rzweb : A complete browser-based reverse engineering platform built on Rizin, running entirely client-side via WebAssembly : github.com/indalok/rzweb

rzweb : A complete browser-based reverse engineering platform built on Rizin, running entirely client-side via WebAssembly : github.com/indalok/rzweb
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔓 Google/Mandiant released Net-NTLMv1 rainbow tables that enable cracking password hashes in under 12 hours using consumer hardware. 🔗 Learn more here → thehackernews.com/2026/01/weekly…

🔓 Google/Mandiant released Net-NTLMv1 rainbow tables that enable cracking password hashes in under 12 hours using consumer hardware.

🔗 Learn more here → thehackernews.com/2026/01/weekly…
SentinelOne (@sentinelone) 's Twitter Profile Photo

Even more concerning: Models that crush math & coding benchmarks show minimal gains on real security analysis. “Reasoning” ≠ analyst thinking

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Windows process internals - VADs (Virtual Address Descriptors). A deep dive into VAD structures, their purpose and function, helpful in memory forensics. A post by imp hash. Source: imphash.medium.com/windows-proces… #redteam #blueteam #maldev #malwaredevelopment

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

This presentation remains the go-to reference for learning the inner workings of the IDA Pro Hex-Rays decompiler: (video) youtube.com/watch?v=T-YkhN… (article) i.blackhat.com/us-18/Thu-Augu… #decompiler #reverseengineer #informationsecurity #cybersecurity

This presentation remains the go-to reference for learning the inner workings of the IDA Pro Hex-Rays decompiler:

(video) youtube.com/watch?v=T-YkhN…

(article) i.blackhat.com/us-18/Thu-Augu…

#decompiler #reverseengineer #informationsecurity #cybersecurity
Smukx.E (@5mukx) 's Twitter Profile Photo

Malware development intermediate: EDR Evasion - A New Technique Using Hardware Breakpoints cymulate.com/blog/blindside…

Malware development intermediate: EDR Evasion - A New Technique Using Hardware Breakpoints

cymulate.com/blog/blindside…
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Powershell for offensive security. A list of offensive tactics with practical tips in using Powershell during security operations. A post by Het Mehta (Het Mehta). Source: hetmehta.com/posts/powershe… #redteam #blueteam #maldev #malwaredevelopment

Nikhil (@ox4d5a) 's Twitter Profile Photo

Windows Internals Part31: Creating IRP with IoAllocateIrp() and DO_DIRECT_IO youtu.be/YQPV0qr77sM #infosec #windows #linux #cybersecurity

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

AV/EDR Lab Environment Setup A curated list of various resources helpful in building own malware-centric research lab. A post by Udayveer Singh (Udayveer Singh) Source: an0nud4y.notion.site/AV-EDR-Lab-Env… #redteam #blueteam #maldev #malwaredevelopment

Vaishnavi Tikke (@vtikke) 's Twitter Profile Photo

MICROSOFT BUILT A TOOL THAT CONVERTS LITERALLY ANYTHING INTO CLEAN MARKDOWN FOR YOUR LLM pdfs. word docs. excel. powerpoint. audio. youtube urls one pip install and your AI pipeline stops choking on raw files forever no custom parsers. no broken layouts. no garbled text. just

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

The FLARE Learning Hub is launching with three modules: - Malware Analysis Crash Course - The Go Reverse Engineering Reference - Introduction to Time Travel Debugging (TTD) 📟 Start learning: bit.ly/41x7MXs