emdel (@emd3l) 's Twitter Profile
emdel

@emd3l

Researcher - Italian, Hackademic, Malware, Memory Forensics, Automation - Opinions are my own.

ID: 86137503

linkhttp://yromem.re calendar_today29-10-2009 19:01:44

15,15K Tweet

2,2K Followers

927 Following

Elastic Security Labs (@elasticseclabs) 's Twitter Profile Photo

Elastic Security Labs MCP tool research shows how tool-poisoning, orchestration injection, and rug-pulls lead to data exfil & RCE. Includes actionable detections + hardening. Read it if you run agents: go.es.io/3VofX5m

Alex Plaskett (@alexjplaskett) 's Twitter Profile Photo

Hacking the Xbox 360 Hypervisor by Ryan M Part 1: System Overview icode4.coffee/?p=1047 Part 2: The Bad Update Exploit icode4.coffee/?p=1081

R.B.C. (@g3tsyst3m) 's Twitter Profile Photo

Hey all, here's my latest blog post: g3tsyst3m.com/fileless%20tec… We'll get to have some fun coding a custom PE loader that downloads and executes our PE in-memory. We'll also take a stab at sneaking past Defender XDR and Sophos XDR. 😸

Fabio Pagani (@pagabuc) 's Twitter Profile Photo

Had a blast attending and presenting at LABScon 2025 for the second year in a row! If you are curious about BYOVD in UEFI, and how we at BINARLY🔬 uncovered an incomplete patch for a Supermicro BMC bug, check out our talk slides below👇

Had a blast attending and presenting at <a href="/labscon_io/">LABScon 2025</a> for the second year in a row! If you are curious about BYOVD in UEFI, and how we at <a href="/binarly_io/">BINARLY🔬</a> uncovered an incomplete patch for a Supermicro BMC bug, check out our talk slides below👇
780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign | unit42.paloaltonetworks.com/operation-rewr… Unit 42

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETresearch has uncovered the North Korea-aligned threat actor, DeceptiveDevelopment, targeting freelance developers with trojanized coding challenges and fake job interviews.  welivesecurity.com/en/eset-resear… 1/6

Malcat (@malcat4ever) 's Twitter Profile Photo

#Malcat tip #10: analysing backdoored clean software can be hard. A quick win is to pivot around known constants, thanks to Malcat's 400k+ constants DB (here a #Tropidoor dlder):

#Malcat tip #10: analysing backdoored clean software can be hard. 
A quick win is to pivot around known constants, thanks to Malcat's 400k+ constants DB (here a #Tropidoor dlder):
780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

Inside Salt Typhoon: China’s State-Corporate Advanced Persistent Threat | Salt Typhoon is a Chinese state-sponsored cyber threat group aligned with the Ministry of State Security (MSS), specializing in long-term espionage operations | dti.domaintools.com/inside-salt-ty… DomainTools

780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

FortiGuard Labs recently observed a phishing campaign designed to impersonate Ukrainian government agencies and deliver additional malware to targeted systems | fortinet.com/blog/threat-re… Fortinet

Lukas Seidel (@pr0me) 's Twitter Profile Photo

I absolutely love this paper, so much reverse engineering alpha the researchers who won the rpi hacking challenge came together to describe in detail how they overcame the defenses of a secure-by-design chip, incl. custom laser fault injection and single instruction skips

I absolutely love this paper, so much reverse engineering alpha

the researchers who won the rpi hacking challenge came together to describe in detail how they overcame the defenses of a secure-by-design chip, incl. custom laser fault injection and single instruction skips
Shanholo (@shanholo) 's Twitter Profile Photo

#EDRFreeze github.com/TwoSevenOneT/E… How does it work? and detection opportunities⤵️ 1⃣"SeDebugPrivege" via administrative access with any members of the Administrators group for example.

780th Military Intelligence Brigade (Cyber) (@780thc) 's Twitter Profile Photo

Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite September 30, 2025, Unit 42 | Palo Alto unit42.paloaltonetworks.com/phantom-taurus/ Unit 42

Ruben Groenewoud (@rfgroenewoud) 's Twitter Profile Photo

Research & PoC: FlipSwitch Rootkit A syscall-table hooking technique that works on modern Linux (6.9+), researched for and presented at Virus Bulletin by RemcoS and me. Revives syscall hooking by patching x64_sys_call call sites instead of table entries. elastic.co/security-labs/…

Richard Johnson (@richinseattle) 's Twitter Profile Photo

Finally! IDA Python support coming to the Free editions! Huge in the era of getting LLMs to analyze binaries and perform initial RE tasks.

hasherezade (@hasherezade) 's Twitter Profile Photo

My recent writeup on updates in #Rhadamanthys stealer, along with some scripts that may be helpful in analysis. Check it out!

Linux Kernel Security (@linkersec) 's Twitter Profile Photo

Eternal-Tux: Crafting a Linux Kernel KSMBD 0-Click RCE Exploit from N-Days William Liu Crusaders of Rust posted an article about exploiting a slab object overflow (CVE-2023-52440) and remote infoleak (CVE-2023-4130) in the kernel SMB3 daemon to gain RCE willsroot.io/2025/09/ksmbd-…

Eternal-Tux: Crafting a Linux Kernel KSMBD 0-Click RCE Exploit from N-Days

William Liu <a href="/cor_ctf/">Crusaders of Rust</a> posted an article about exploiting a slab object overflow (CVE-2023-52440) and remote infoleak (CVE-2023-4130) in the kernel SMB3 daemon to gain RCE

willsroot.io/2025/09/ksmbd-…
Faith 🇧🇩🇦🇺 (@farazsth98) 's Twitter Profile Photo

Blog post is out! Come learn about how I analyzed the latest kernelCTF 1-day submission. This was a vulnerability in the Kernel TLS subsystem. I didn't write a full exploit yet, but Pumpkin 🎃 already gave me some ideas that I will try to implement soon😅 faith2dxy.xyz/2025-10-02/kCT…

Alex Plaskett (@alexjplaskett) 's Twitter Profile Photo

A great write-up of a VMware Workstation guest-to-host escape (CVE-2023-20870/CVE-2023-34044 and CVE-2023- 20869) exploit by Alex Zaviyalov has just been published!

A great write-up of a VMware Workstation guest-to-host escape (CVE-2023-20870/CVE-2023-34044 and CVE-2023-
20869) exploit by Alex Zaviyalov has just been published!