hasherezade(@hasherezade) 's Twitter Profileg
hasherezade

@hasherezade

Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)

ID:1590754944

linkhttps://hasherezade.net calendar_today13-07-2013 11:17:31

23,4K Tweets

84,4K Followers

846 Following

Follow People
GuidedHacking(@GuidedHacking) 's Twitter Profile Photo

🔍 Using PE-sieve For Malware Analysis
💻 Detects malicious payloads, shellcode
🛡️ Reconstructs corrupted PE headers
🧩 Handles obfuscated code parts easily
⚙️ Customizable with various command-line args
🔧 Integrate into tools as DLL or static lib
👉guidedhacking.com/threads/how-to…

🔍 Using PE-sieve For Malware Analysis 💻 Detects malicious payloads, shellcode 🛡️ Reconstructs corrupted PE headers 🧩 Handles obfuscated code parts easily ⚙️ Customizable with various command-line args 🔧 Integrate into tools as DLL or static lib 👉guidedhacking.com/threads/how-to…
account_circle
Adam Leventhal(@ahl) 's Twitter Profile Photo

“Beginning with Windows Server 2025, dtrace is included as a built-in tool.” This is awesome to see! learn.microsoft.com/en-us/windows-…

account_circle
thaddeus e. grugq thegrugq@infosec.exchange(@thegrugq) 's Twitter Profile Photo

Telegram is a social media platform, not a secure messenger. The primary use of the system is for groups, with one to one messaging occupying the same space as Twitter DMs.

Signal and Telegram address very different markets.

account_circle
Brian Baskin(@bbaskin) 's Twitter Profile Photo

Swee Lai Lee is an extremely talented threat researcher and malware analyst from my team. Laid off after 8 years as part of the Carbon Black acquisition into Broadcom

Based in Malaysia, spoke at RSA, analysis writeups, large-scale malware tests against vendor products

Hire her!

Swee Lai Lee is an extremely talented threat researcher and malware analyst from my team. Laid off after 8 years as part of the Carbon Black acquisition into Broadcom Based in Malaysia, spoke at RSA, analysis writeups, large-scale malware tests against vendor products Hire her!
account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

GDATA researchers look into recent Rust shellcode loaders abusing online meeting software GoTo Meeting to deploy Remcos RAT. gdatasoftware.com/blog/2024/05/3…

GDATA researchers look into recent Rust shellcode loaders abusing online meeting software GoTo Meeting to deploy Remcos RAT. gdatasoftware.com/blog/2024/05/3…
account_circle
Insomni'hack(@1ns0mn1h4ck) 's Twitter Profile Photo

🛡️💻 If you were unable to attend the 2024 conferences or would like to watch some of them again.

👉 They are now online: ow.ly/BFXj50RFiyG
👉 Slides are also available (others may be added): ow.ly/fVAE50RFiyH

📸 Marine Garnier

🛡️💻 If you were unable to attend the 2024 conferences or would like to watch some of them again. 👉 They are now online: ow.ly/BFXj50RFiyG 👉 Slides are also available (others may be added): ow.ly/fVAE50RFiyH 📸 Marine Garnier #INSO24 #CTF #cybersecurity
account_circle
I am Jakoby(@I_Am_Jakoby) 's Twitter Profile Photo

The last couple days have been so wildly productive and i am proud of myself
I completely rebuilt the engine, api, and website for my powershell polymorphic reverse shell generator
and now that I have done so much work on it again I need help testing it against different AVs.…

The last couple days have been so wildly productive and i am proud of myself I completely rebuilt the engine, api, and website for my powershell polymorphic reverse shell generator and now that I have done so much work on it again I need help testing it against different AVs.…
account_circle
Krzysztof Tmc(@blueeyedboy88) 's Twitter Profile Photo

Dzień dobry. Ktoś wyłudza i zapewne handluje lekami narkotycznymi. Mamy dane lekarzy, którzy wystawili recepty,( receptomaty?), mamy adresy realizacji recept, ale sprawcy i sprawców nie da się znaleźć. Jedyna osoba, której zależy to córka lekarka..

Dzień dobry. Ktoś wyłudza i zapewne handluje lekami narkotycznymi. Mamy dane lekarzy, którzy wystawili recepty,( receptomaty?), mamy adresy realizacji recept, ale sprawcy i sprawców nie da się znaleźć. Jedyna osoba, której zależy to córka lekarka..
account_circle
Pavel Yosifovich(@zodiacon) 's Twitter Profile Photo

First part of chapter 11 has been published (security)! See how to call NtCreateToken :)
Chapter 10 is not ready yet, I'll leave it for later.
leanpub.com/windowsnativea…

account_circle
Binni Shah(@binitamshah) 's Twitter Profile Photo

Hooking System Calls in Windows 11 22H2 like Avast Antivirus. Research, analysis and bypass : the-deniss.github.io/posts/2022/12/… credits Denis Skvortcov

account_circle
Theo(@theokwebb) 's Twitter Profile Photo

I just posted a roadmap on how I learnt C (+ x86-64 Assembly and OS Internals) from scratch.

I highly recommend it to anyone planning to take a course at OpenSecurityTraining2 or who is interested in malware development.

github.com/theokwebb/C-fr…

account_circle
Will(@BushidoToken) 's Twitter Profile Photo

New advisory on APT28/FANCY BEAR 🇷🇺 activity by CERT Poland 🇵🇱 observed this first week of May targeting Polish government institutions.

🔎 Looks like they've moved away from CVE-2023-38831 in WinRAR or CVE-2023-23397 in Outlook in this campaign.

cert.pl/en/posts/2024/… 1/3

New advisory on APT28/FANCY BEAR 🇷🇺 activity by CERT Poland 🇵🇱 observed this first week of May targeting Polish government institutions. 🔎 Looks like they've moved away from CVE-2023-38831 in WinRAR or CVE-2023-23397 in Outlook in this campaign. cert.pl/en/posts/2024/… 1/3
account_circle
Daniel Jary(@JanielDary) 's Twitter Profile Photo

For anyone that's interested, following my talk 'Immoral Fiber: Unlocking & Discovering New Offensive Capabilities of Fibers' at Black Hat Asia 2024 I have open-sourced my new techniques here:
github.com/JanielDary/Imm…

account_circle
Scott Noone(@analyzev) 's Twitter Profile Photo

If you rely on Driver Verifier beware that it's not working as expected on Windows 11: osr.com/blog/2024/05/0…

account_circle
Alejandro / _hyp3ri0n / P4x(@_hyp3ri0n) 's Twitter Profile Photo

folks please help me get this word out. @Crowdstrike named some ransomware PunkSpider, literally the name of one of the pieces of software I made. Completely unrelated of course, mine is a security tool.

This is NOT cool, appreciate RTs to get them to change this.

account_circle
Karsten Hahn(@struppigel) 's Twitter Profile Photo

The thing is, VMProtect is pretty much useless when it is only applied on the PyInstaller stub's code.

The PyInstaller archive at the end of the file is still as before and you can extract all the Python bytecode.

account_circle
Jiří Vinopal(@vinopaljiri) 's Twitter Profile Photo

I am excited to announce I'll be presenting ' Breaking Boundaries: Investigating Vulnerable Drivers and Mitigating Risks' at 🥳
virusbulletin.com/conference/vb2…

and the high popularity of abusing vulnerable drivers is here for a while so let´s see what new I am gonna…

account_circle