Raashid Bhat (@raashidbhatt) 's Twitter Profile
Raashid Bhat

@raashidbhatt

☯︎ Building next-level tools for Cyber Threat Hunting ☯︎
@malwareid_

ID: 39795694

linkhttp://int0xcc.svbtle.com/ calendar_today13-05-2009 17:18:32

246 Tweet

1,1K Followers

229 Following

Raashid Bhat (@raashidbhatt) 's Twitter Profile Photo

🛠 Basics of PE32+ ( 64bit portable executable ) format ~ malwareid.in/unpack/unpacki… Learn basics of the 64bit executable format on windows and how it differs from 32bit . 🎂 Bonus ~ Includes code to parse headers in a PE 64bit file

🛠 Basics of PE32+ ( 64bit portable executable ) format ~ malwareid.in/unpack/unpacki…

Learn basics of the 64bit executable format on windows and how it differs from 32bit .

🎂 Bonus  ~ Includes code to parse headers in a PE 64bit file
Raashid Bhat (@raashidbhatt) 's Twitter Profile Photo

Are stack expansion and stack guard not present in the 64-bit version of Windows kernel? Stack Guard is not set in RtlCreateUserStack while creating the stack for a new thread #windowskernel #kernel

Are stack expansion and stack guard not present in the 64-bit version of Windows kernel?

Stack Guard is not set in RtlCreateUserStack while creating  the stack for a new thread

#windowskernel #kernel
Raashid Bhat (@raashidbhatt) 's Twitter Profile Photo

"What Every Malware Analyst Should Know About PE Relocations" ~ malwareid.in/unpack/unpacki… 🔍 A new blog post for an in-depth look at Portable Executable (PE) relocations. From malware loading essentials to kernel routine reverse engineering, it's a journey every malware analyst

Raashid Bhat (@raashidbhatt) 's Twitter Profile Photo

➡️ New Blog Post ! ➡️ ➡️ Learn in-depth about the Export Address Table and how forwarders are used in DLLs."➡️ Export Address Table , Export Forwarding and DLL side-loading ~ malwareid.in/unpack/unpacki… follow Malware ID #CyberSecurity #infosecurity #infosec

Aurélien Chalot (@defte_) 's Twitter Profile Photo

It's finally out: from a Windows driver to a fully functionnal driver. In this blogpost we'll go through the history of EDR's, how they used to work, how they work now and how we can build a fully functionnal one. Last step is a chall, bypass MyDumbEDR sensepost.com/blog/2024/sens…

Raashid Bhat (@raashidbhatt) 's Twitter Profile Photo

Analysing Windows Malware on Apple Mac M1/M2 ( Windows 11 ARM ) - Part I ~ int0xcc.svbtle.com/apple-m2-or-wi… #malware #infosec

Artem I. Baranov 🐦 (@artem_i_baranov) 's Twitter Profile Photo

Curious what Windows Internals tricks rootkits have leveraged throughout their history to achieve the necessary goals of concealing malicious activities, I've published a pdf with a breakdown of these tricks. It covers the following rootkit families. artemonsecurity.blogspot.com/2024/06/window…

Curious what Windows Internals tricks rootkits have leveraged throughout their history to achieve the necessary goals of concealing malicious activities, I've published a pdf with a breakdown of these tricks. It covers the following rootkit families. artemonsecurity.blogspot.com/2024/06/window…