Delphos Labs (@delphoslabs) 's Twitter Profile
Delphos Labs

@delphoslabs

ID: 1817655932089982978

calendar_today28-07-2024 20:18:51

1 Tweet

25 Takipçi

1 Takip Edilen

Caleb Fenton (@caleb_fenton) 's Twitter Profile Photo

If any of y'all are reverse engineers, my company is trying to automate all the tedium. We could really use your input on what tools you use and what your workflow looks like. We have a survey here: docs.google.com/forms/d/e/1FAI…

Delphos Labs (@delphoslabs) 's Twitter Profile Photo

📣Survey Alert: Reverse engineers, vuln hunters & malware analysts: help shape automated reverse engineering. Take a quick survey & tell us what frustrates you the most & what to automate next. 👉docs.google.com/forms/d/e/1FAI… First look 👉 delphoslabs.com #ReverseEngineering

Caleb Fenton (@caleb_fenton) 's Twitter Profile Photo

Binary highlight: Modded DXGI.dll that spoofs an RTX 4090, hooks DXGI, and reroutes DLSS to OptiScaler’s FSR/XeSS. Hard to spot—but Delphos auto-flagged it and generated a clear write-up in a couple minutes. Sample: delphoslabs.com/uploads/577e12… #ReverseEngineering via Delphos Labs

Binary highlight: Modded DXGI.dll that spoofs an RTX 4090, hooks DXGI, and reroutes DLSS to OptiScaler’s FSR/XeSS. Hard to spot—but Delphos auto-flagged it and generated a clear write-up in a couple minutes. Sample: delphoslabs.com/uploads/577e12… #ReverseEngineering  via <a href="/DelphosLabs/">Delphos Labs</a>
Caleb Fenton (@caleb_fenton) 's Twitter Profile Photo

Binary highlight: “Cyberpunk 7777 / QubePi” ELF. Text-menu game with hard-coded Postgres creds. Every login/chat/coord sent in clear on 5432—no TLS, no sanitization. Delphos auto-exposed the creds & flow in minutes. Sample: delphoslabs.com/uploads/26cc38… #ReverseEngineering

Binary highlight: “Cyberpunk 7777 / QubePi” ELF. Text-menu game with hard-coded Postgres creds. Every login/chat/coord sent in clear on 5432—no TLS, no sanitization. Delphos auto-exposed the creds &amp; flow in minutes.
Sample: delphoslabs.com/uploads/26cc38…
#ReverseEngineering
Caleb Fenton (@caleb_fenton) 's Twitter Profile Photo

🔍 Binary highlight: polished Linux daemon that keylogs X11 + hijacks bash TTYs via ptrace, proxies with a PTY, and exfils keystrokes in raw AF_PACKET frames—no C2, no crypto. Delphos flagged the whole implant in a couple minutes. This went undetected for a while and was setting

Delphos Labs (@delphoslabs) 's Twitter Profile Photo

We flagged this binary as Conti-style ransomware before checking threat intel. All automated. No unpacking. No signatures. Just behavior: Threaded loader. AES/RSA encryption. Dynamic API calls. It screamed “Conti” before we did. Patterns > signatures. delphoslabs.com/uploads/2b4e9a…

We flagged this binary as Conti-style ransomware before checking threat intel.
All automated.
No unpacking. No signatures. Just behavior:
Threaded loader. AES/RSA encryption. Dynamic API calls.
It screamed “Conti” before we did.
Patterns &gt; signatures.
delphoslabs.com/uploads/2b4e9a…
Joshua J. Drake (@jduck) 's Twitter Profile Photo

My employer, Delphos Labs, is surveying the RE community to optimize the impact of our future development. It's only open for one more week. Last chance to participate! We'd love to learn more about you, your needs, or feedback on the public beta! Try it! docs.google.com/forms/d/e/1FAI…

Delphos Labs (@delphoslabs) 's Twitter Profile Photo

🎃 Happy Halloween from the Delphos Labs team! “Ghosts in the Machine” 👻 The only things scarier than hackers? Our Halloween costumes. 💀 Even people who work in the shadows of code need a frightfully good time. No incidents were reported, just excellent costumes.

🎃 Happy Halloween from the Delphos Labs team!
“Ghosts in the Machine” 👻
The only things scarier than hackers? Our Halloween costumes. 💀 Even people who work in the shadows of code need a frightfully good time. No incidents were reported, just excellent costumes.