L (@x86rax) 's Twitter Profile
L

@x86rax

Senior SOC Analyst // Malware RE/Threat Int

ID: 3025744600

calendar_today08-02-2015 22:45:44

709 Tweet

1,1K Takipçi

470 Takip Edilen

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

FBI warnings are true—fake file converters do push malware - Lawrence Abrams bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Gootloader (@gootloader) 's Twitter Profile Photo

⚠️ New TTPs detected for #Gootloader ⚠️ Out are the PDF conversions and back in are legal document lurs. They are still using #malvertising, not SEO poisoning. 📝Full analysis: gootloader.wordpress.com/2025/03/31/goo…

The Haag™ (@m_haggis) 's Twitter Profile Photo

🚨 New drop for the defenders: The ClickGrab Interactive Analyzer is live. 🧠🔍 If you’re staring down FakeCAPTCHA chains, shady redirects, or weird JS doing clipboard voodoo — this tool’s for you. 🧪 Paste a URL → get: • HTML inspection • IOC extraction • Clipboard

🚨 New drop for the defenders:
The ClickGrab Interactive Analyzer is live. 🧠🔍

If you’re staring down FakeCAPTCHA chains, shady redirects, or weird JS doing clipboard voodoo — this tool’s for you.

🧪 Paste a URL → get: 

• HTML inspection
• IOC extraction
• Clipboard
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Learn how to detect and threat hunt for LUMMAC.V2, a prevalent infostealer malware, from Mandiant experts. 🔍 🔗 bit.ly/3RLVcif #ThreatIntelligence #ThreatHunter

Learn how to detect and threat hunt for LUMMAC.V2, a prevalent infostealer malware, from Mandiant experts. 🔍

🔗 bit.ly/3RLVcif

#ThreatIntelligence #ThreatHunter
Bilawal Sidhu (@bilawalsidhu) 's Twitter Profile Photo

Introducing VibeCon — the world’s largest vibe coding conference. Make sure you register today: http://127.0.0.1:8080/register

Hai vaknin (@vakninhai) 's Twitter Profile Photo

CONTEXT-only injection No VirtualAllocEx. No WriteProcessMemory. We show how pure register-/stack manipulation can: Load a DLL with a pointer-only LoadLibrary call Spin up a remote thread via NtCreateThread that self-allocates & self-writes inside the target Chain APC-safe

ö (@r0keb) 's Twitter Profile Photo

Good morning! I just published a blog post about a KASLR bypass that works on modern Windows 11 versions. It leverages Intel CPU cache timings to exfiltrate the base address of ntoskrnl.exe. I hope you like it! r0keb.github.io/posts/Bypassin…

Lisa Forte (@lisaforteuk) 's Twitter Profile Photo

Working in cybersecurity is like in civ where you are defending your city with long swordsmen and the attacker has nuclear cyber robots

OffSec (@offsectraining) 's Twitter Profile Photo

🧠 It’s #MentalHealthAwarenessMonth! Cybersecurity demands resilience—and that includes taking care of your mental health. This month, we're shining a light on what mental toughness really means in our field, along with tips on how to recharge, stay focused, and grow

🧠 It’s #MentalHealthAwarenessMonth!

Cybersecurity demands resilience—and that includes taking care of your mental health.

This month, we're shining a light on what mental toughness really means in our field, along with tips on how to recharge, stay focused, and grow
L (@x86rax) 's Twitter Profile Photo

Did you know the Steam Web Helper binary can be used as a #LOLbin to execute arbitrary processes on a system? Nifty little trick! Eg: .\steamwebhelper.exe --disable-gpu-sandbox --gpu-launcher="C:\Windows\system32\cmd.exe"

Did you know the Steam Web Helper binary can be used as a #LOLbin to execute arbitrary processes on a system? Nifty little trick!

Eg:

.\steamwebhelper.exe --disable-gpu-sandbox --gpu-launcher="C:\Windows\system32\cmd.exe"
Swissky (@pentest_swissky) 's Twitter Profile Photo

Exploiting eneio64.sys Kernel Driver on Windows 11 by Turning Physical Memory R/W into Virtual Memory R/W xacone.github.io/eneio-driver.h…