herrcore (@herrcore) 's Twitter Profile
herrcore

@herrcore

UnpacMe | OALABS

ID: 43022669

linkhttp://www.openanalysis.net/ calendar_today28-05-2009 02:03:24

8,8K Tweet

12,12K Followers

505 Following

RE//verse (@reverseconf) 's Twitter Profile Photo

The conference website is live! re-verse.io CFP is now open and training tickets are open as well. General ticket sales live in three weeks!

Karsten Hahn (@struppigel) 's Twitter Profile Photo

"Clean file analysis" live stream with Josh Stroschein | The Cyber Yeti just ended. You can watch the recording here. Thanks for inviting me, Josh! youtube.com/watch?v=3UzTbO…

Josh Kamdjou (@jkamdjou) 's Twitter Profile Photo

i’m looking for someone who can rip apart an email attack, identify what’s interesting about the techniques used by the attacker, what makes it hard to detect, and produce well written content. here’s a specific example from a talk i gave at blue team con today. would love to

i’m looking for someone who can rip apart an email attack, identify what’s interesting about the techniques used by the attacker, what makes it hard to detect, and produce well written content. 

here’s a specific example from a talk i gave at blue team con today. would love to
mishap (@oopsmishap) 's Twitter Profile Photo

🚨💻 Tired of C being "old-fashioned"? Spice it up with anonymous functions using this λ-macro hack! Say hello to cleaner, smarter code in pure C! 🎯 #redteamtips #security #redteam 👀👇

🚨💻 Tired of C being "old-fashioned"? Spice it up with anonymous functions using this λ-macro hack! 
Say hello to cleaner, smarter code in pure C! 🎯 #redteamtips #security #redteam
👀👇
LoaderInsightAgency (@lia_intel) 's Twitter Profile Photo

We are now tracking 7 loader families across 68 active botnets. The most recent addition, not going to name fingers and point names but here is a hint: 🧹 📈Since May 2024 we have observed 21,256 payloads and 4,883 tasks🕵️‍♂️

We are now tracking 7 loader families across 68 active botnets. The most recent addition, not going to name fingers and point names but here is a hint: 🧹

📈Since May 2024 we have observed 21,256 payloads and 4,883 tasks🕵️‍♂️
UNPACME (@unpacme) 's Twitter Profile Photo

UNPACME 8.5.0 is live! ⚡️ MalwareID - a blazing-fast mode for quickly identifying and extracting malware configurations. 🔎 New Pivots and Improved Search 💾 Updated DiE Interface & Rules 🚀 Yara Hunt Improvements blog.unpac.me/2024/09/08/mal…

herrcore (@herrcore) 's Twitter Profile Photo

Is this a new stealer technique or just something flying under the radar 🤔 - Open browser in kiosk mode (no escape) - Force user to enter Google creds - Steal them from the browser! cc UNPACME LoaderInsightAgency research.openanalysis.net/credflusher/ki…

BruCON (@brucon) 's Twitter Profile Photo

Only a few days left until the 16th edition of BruCON kicks off! 🎉 Join us for our 3rd year at our stunning venue "The Lamot" in the charming city of #Mechelen. We can't wait to welcome you all! #BruCON0x10 #HackingForBeer 🍻

Only a few days left until the 16th edition of BruCON kicks off! 🎉 Join us for our 3rd year at our stunning venue "The Lamot" in the charming city of #Mechelen. We can't wait to welcome you all! #BruCON0x10 #HackingForBeer 🍻
hasherezade (@hasherezade) 's Twitter Profile Photo

New #PEbear is out (v0.7.0) - with new icon, Qt6, ARM64 support and more goodies 😊! Check it out: github.com/hasherezade/pe…

New #PEbear is out (v0.7.0) - with new icon, Qt6, ARM64 support and more goodies 😊! Check it out: github.com/hasherezade/pe…
BruCON (@brucon) 's Twitter Profile Photo

Can't join #BruCON0x10 this year ? No worries, as always we will stream all talks brucon.org/2024/streaming/ and upload them to our YouTube channel youtube.com/@brucontalks the same day ! #HackingForBeer

Duncan Ogilvie 🍍 (@mrexodia) 's Twitter Profile Photo

Last minute change in the schedule of BruCON 0x10. I will be presenting a workshop about LLVM for Reverse Engineers (introduction) brucon0x10.sched.com/event/60c6e638… BruCON

hack_lu (@hack_lu) 's Twitter Profile Photo

The first version of the #hacklu 2024 agenda is now live. Check it out here: 2024.hack.lu/agenda/ Don't miss out—join us for this year's edition! #infosec #conference #Luxembourg

RE//verse (@reverseconf) 's Twitter Profile Photo

Ready to tackle complex obfuscated code? Learn from Tim Blazytko Tim Blazytko at RE//verse Training in Orlando. Gain hands-on experience with cutting-edge deobfuscation methods. re-verse.io/deobfuscation-…

LoaderInsightAgency (@lia_intel) 's Twitter Profile Photo

A new task from the same actor: http://185.215.113[.]103/test/blo.ps1 The initial script opens Chrome to YouTube in kiosk mode (as shared), 2 hrs later it is updated to only open Chrome in normal mode. 🧐 Batch, PS and AutoIT; this technique continues to be developed & tested

RE//verse (@reverseconf) 's Twitter Profile Photo

Only 2 hours before the first round of RE//verse tickets go on sale. Set your alarm for the final count down! #infosec #conference youtube.com/watch?v=9jK-Nc…