k0ng0 (@k0ng0x86) 's Twitter Profile
k0ng0

@k0ng0x86

computer enthusiast - ninja in training

ID: 1851987965355958272

calendar_today31-10-2024 14:02:28

56 Tweet

3 Followers

156 Following

Duncan Ogilvie 🍍 (@mrexodia) 's Twitter Profile Photo

Also made a quick video on how to install TitanHide in Windows Sandbox using the SandboxBootkit project. It takes about 3 minutes end-to-end.

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

Top 10 last week's threats by uploads 🌐 ⬇️ #Lumma 353 (490) ⬆️ #Remcos 292 (228) ⬆️ #Agenttesla 291 (251) ⬆️ #Asyncrat 273 (190) ⬆️ #Dcrat 242 (159) ⬆️ #Xworm 198 (195) ⬇️ #Snake 180 (203) ⬇️ #Neconyd 175 (220) ⬆️ #Quasar 144 (115) ⬆️ #Darkcrystal 113 (73) Track them all:

Top 10 last week's threats by uploads 🌐
⬇️ #Lumma 353 (490)
⬆️ #Remcos 292 (228)
⬆️ #Agenttesla 291 (251)
⬆️ #Asyncrat 273 (190)
⬆️ #Dcrat 242 (159)
⬆️ #Xworm 198 (195)
⬇️ #Snake 180 (203)
⬇️ #Neconyd 175 (220)
⬆️ #Quasar 144 (115)
⬆️ #Darkcrystal 113 (73)
Track them all:
Invoke RE (@invokereversing) 's Twitter Profile Photo

We've uploaded our Time Travel Debugging in Binary Ninja stream with Xusheng Li from Vector 35 where we unpacked malware and analyzed anti-analysis capabilities with TTD traces. Enjoy!

We've uploaded our Time Travel Debugging in Binary Ninja stream with Xusheng Li from <a href="/vector35/">Vector 35</a> where we unpacked malware and analyzed anti-analysis capabilities with TTD traces. Enjoy!
Unit 42 (@unit42_intel) 's Twitter Profile Photo

Analyzing LNK malware? Unit 42 details the structure of LNK files, then dissects overlay content execution techniques and more. Learn how attackers exploit the flexibility of this file type. bit.ly/3InIu7C

Analyzing LNK malware? Unit 42 details the structure of LNK files, then dissects overlay content execution techniques and more. Learn how attackers exploit the flexibility of this file type. bit.ly/3InIu7C
Unit 42 (@unit42_intel) 's Twitter Profile Photo

Attackers are more frequently using Windows shortcut (LNK) files to distribute malware. We cover four main categories of LNK malware: exploit execution, malicious file execution, in-argument script execution and overlay execution. bit.ly/3InIu7C

Attackers are more frequently using Windows shortcut (LNK) files to distribute malware. We cover four main categories of LNK malware: exploit execution, malicious file execution, in-argument script execution and overlay execution. bit.ly/3InIu7C
GuidedHacking (@guidedhacking) 's Twitter Profile Photo

🚨 April 2025 Content Round Up 🗄️ How to Dump Manually Mapped DLLs 🛡️ Windows Defender Bypass - Token Manipulation 🔍 Analyzing PolyGlot IcedID Malware 🕵️ Reverse Engineering Runescape 3 Packets 📚 C++ Game Hacking Library 📋 MMO Packet Logging Tutorial 🐍 Python Game Hacking -

🚨 April 2025 Content Round Up
🗄️ How to Dump Manually Mapped DLLs
🛡️ Windows Defender Bypass - Token Manipulation
🔍 Analyzing PolyGlot IcedID Malware
🕵️ Reverse Engineering Runescape 3 Packets
📚 C++ Game Hacking Library
📋 MMO Packet Logging Tutorial
🐍 Python Game Hacking -
Vector 35 (@vector35) 's Twitter Profile Photo

Binary Ninja 5.1 is now released: binary.ninja/2025/07/24/5.1… - New WARP function matching - Pseudo Objective-C - Binexport plugin built-in - IL Rewriting Examples, APIs, and Docs - Arch: PPC VLE, mips-r5900, x32 + Much more!

LoaderInsightAgency (@lia_intel) 's Twitter Profile Photo

Payload statistics from July 2025 📊 We observed 625 tasks distributed by threat actors across the tracked botnets. This resulted in 2367 unique payloads. Top families: 1. #GCleaner 2. #Amadey 3. #LummaStealer 4. #NirSoftNirCmd 5. #QuasarRAT Unpacking & detection: UNPACME

Payload statistics from July 2025 📊
We observed 625 tasks distributed by threat actors across the tracked botnets. This resulted in 2367 unique payloads.

Top families:
1. #GCleaner
2. #Amadey
3. #LummaStealer
4. #NirSoftNirCmd
5. #QuasarRAT

Unpacking &amp; detection: <a href="/unpacme/">UNPACME</a>
Vector 35 (@vector35) 's Twitter Profile Photo

Want to learn how compilers use global pointers? Or just want to know how Binary Ninja handles them during analysis and how you can get the best decompilation? Xusheng walks you through it our latest blog post: binary.ninja/2025/08/07/wor…

Want to learn how compilers use global pointers? Or just want to know how Binary Ninja handles them during analysis and how you can get the best decompilation? Xusheng walks you through it our latest blog post: binary.ninja/2025/08/07/wor…
Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦🎗️ (@yo_yo_yo_jbo) 's Twitter Profile Photo

New blogpost, this time about different ways to dump lsass. While not novel, I explain all techniques and uploaded a full implementation of different ways of dumping lsass: github.com/yo-yo-yo-jbo/d… As a reminder, all my content is available at jonathanbaror.com

New blogpost, this time about different ways to dump lsass. While not novel, I explain all techniques and uploaded a full implementation of different ways of dumping lsass:
github.com/yo-yo-yo-jbo/d…

As a reminder, all my content is available at jonathanbaror.com
Huntress (@huntresslabs) 's Twitter Profile Photo

Ransomware groups don’t just encrypt files, they steal them first. Data staging + exfiltration is the most common step before encryption. Here's how it happens (with real tactics + command lines):👇 okt.to/UWIZev

Ransomware groups don’t just encrypt files, they steal them first.
Data staging + exfiltration is the most common step before encryption.
Here's how it happens (with real tactics + command lines):👇
okt.to/UWIZev
Pavel Yosifovich (@zodiacon) 's Twitter Profile Photo

I just released a new video: How WSL 1 Works. In this video, I explain how Windows Subsystem for Linux version 1 runs ELF binaries. trainsec.net/library/window…

raptor@infosec.exchange (@0xdea) 's Twitter Profile Photo

Eight years later, I’ve updated my most-starred GitHub repository with some new Frida scripts, inspired by spaceraccoon | Eugene Lim new book “From Day Zero to Zero Day”. Check it out: github.com/0xdea/frida-sc…

Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

🚦 Stop guessing and start GOing. The upcoming IDA 9.2 release brings cleaner Golang decompilation with tuple types. Read the full blog: eu1.hubs.ly/H0mFg8l0

🚦 Stop guessing and start GOing. The upcoming IDA 9.2 release brings cleaner Golang decompilation with tuple types. 

Read the full blog: eu1.hubs.ly/H0mFg8l0