Daniel Abay (@ab4y98) 's Twitter Profile
Daniel Abay

@ab4y98

just another cyber security dude

ID: 737211266704527360

linkhttps://linktr.ee/danielabay calendar_today30-05-2016 09:17:17

157 Tweet

175 Takipçi

1,1K Takip Edilen

Daniel Abay (@ab4y98) 's Twitter Profile Photo

If you interested in RE (Reverse Engineering) check out my new writeups for majorsopa's crackmes. ab4y98.github.io/crackme2

Cube0x0 (@cube0x0) 's Twitter Profile Photo

Over a year ago, I left my position at WithSecure to start a new journey, create something new, and do my own thing. Today, I'm excited to publicly announce what I've been working on all this time. Introducing 0xC2, a cross-platform C2 framework targeting Windows, Linux, and

Over a year ago, I left my position at WithSecure to start a new journey, create something new, and do my own thing. Today, I'm excited to publicly announce what I've been working on all this time.

Introducing 0xC2, a cross-platform C2 framework targeting Windows, Linux, and
Mohit Mishra (@chessman786) 's Twitter Profile Photo

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Rather than focusing on how to operate tools like IDA or OllyDbg, this book aims to cultivate a mindset geared toward unraveling how software systems function at their most fundamental

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Rather than focusing on how to operate tools like IDA or OllyDbg, this book aims to cultivate a mindset geared toward unraveling how software systems function at their most fundamental
Nithin Chenthur Prabhu (@azr43lkn1ght) 's Twitter Profile Photo

Introducing Rusty-PE-Packer: a sophisticated Windows PE packer written in Rust, featuring progressive masked RC4 encryption, VEH exploitation for ROP gadget execution via RIP manipulation, and injection into legitimate Windows processes. github.com/Azr43lKn1ght/R… #Rust #maldev

Introducing Rusty-PE-Packer: a sophisticated Windows PE packer written in Rust, featuring progressive masked RC4 encryption, VEH exploitation for ROP gadget execution via RIP manipulation, and injection into legitimate Windows processes.

github.com/Azr43lKn1ght/R…

#Rust #maldev
Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

Finally, two new options by Aurélien Chalot got merged into NetExec🔥 --qwinsta: Enumerate active sessions on the target, including numerous useful information --tasklist: Well... enumerates all running tasks on the host Update & enjoy the new reconnaissance flags🔎

Finally, two new options by <a href="/Defte_/">Aurélien Chalot</a> got merged into NetExec🔥

--qwinsta: Enumerate active sessions on the target, including numerous useful information
--tasklist: Well... enumerates all running tasks on the host

Update &amp; enjoy the new reconnaissance flags🔎
LaurieWired (@lauriewired) 's Twitter Profile Photo

Just built an MCP for Ghidra. Now basically any LLM (Claude, Gemini, local...) can Reverse Engineer malware for you. With the right prompting, it automates a *ton* of tedious tasks. One-shot markups of entire binaries with just a click. Open source, on Github now.

RedTeamTacticsAcademy (@redteamtactics) 's Twitter Profile Photo

Don’t you think the bar for hiring red teamers is getting low? Lately, I’ve seen more companies feel obligated to build in-house red teams and in the rush, they’re hiring without vetting. Someone gets an OSCP and suddenly they’re a red teamer. But they can’t set up infra. They

Synacktiv (@synacktiv) 's Twitter Profile Photo

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by Guillaume André and Wil. synacktiv.com/publications/n…