James T. Bennett (@jtbennettjr) 's Twitter Profile
James T. Bennett

@jtbennettjr

malware analyst, pizza expert

ID: 1713680959

calendar_today30-08-2013 20:23:55

186 Tweet

821 Takipçi

128 Takip Edilen

Adrien B (@int2e_) 's Twitter Profile Photo

Malware using CLFS logs to hide a payload? Check out this analysis by myself and Malchanic on some tricky malware we named PRIVATELOG and a related utility/installer called STASHLOG. fireeye.com/blog/threat-re…

Hors (@horsicq) 's Twitter Profile Photo

XELFViewer - ELF file viewer/editor for Windows, Linux and MacOS. 0.03 [+] Linux AppImage [+] Autotools build system [+] PKG installer for OSX [+] RISCV disassembler [+] Many bugs have been fixed. github.com/horsicq/XELFVi…

James T. Bennett (@jtbennettjr) 's Twitter Profile Photo

This year I was able to test a bunch of our challenges and had a really great time with them. You're all in for a treat! #flareon8

Alyssa (she/her) (@ramen0x3f) 's Twitter Profile Photo

Alright, folks, let's talk about Cobalt Strike! mandiant.com/resources/defi… (Sorry, red team pals. This one is for my defense buddies!) 🧵

Willi Ballenthin (@williballenthin) 's Twitter Profile Photo

short post introducing `biodiff`, a tool by 8051 enthusiast for diffing binary files, and how you might use it to find malware configuration changes. the UI is really quick and the algorithms handle file alignment very well. williballenthin.com/post/2022-03-0…

short post introducing `biodiff`, a tool by <a href="/8051Enthusiast/">8051 enthusiast</a> for diffing binary files, and how you might use it to find malware configuration changes. the UI is really quick and the algorithms handle file alignment very well.

williballenthin.com/post/2022-03-0…
Steve Eckels (@stevemk14ebr) 's Twitter Profile Photo

Introducing STrace & PDBReSym! An MIT licensed reimplantation of dtrace and rust symbolicating tool. Allows system call hooks in a patchguard compatible way. See my DEFCON talk recording for more details, or the /blog folder for now until that's public! github.com/mandiant/STrace

Mike Hunhoff (@mehunhoff) 's Twitter Profile Photo

🚨 Today we're excited to release Ghidrathon, a Ghidra extension that adds modern Python 3 scripting (including Python 3.10) to Ghidra! Blog 👉 mandiant.com/resources/blog… GitHub 👉 github.com/mandiant/Ghidr…

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Don't miss the next installment of the Mandiant FLARE team's webinar series, The Sample. This week, Principal Reverse Engineer Blaine Stancill will explain the inner workings of a dropper from the #WHITEDAGGER malware family. Register now! mndt.info/3UJAUGj

Don't miss the next installment of the Mandiant FLARE team's webinar series, The Sample. This week, Principal Reverse Engineer Blaine Stancill will explain the inner workings of a dropper from the #WHITEDAGGER malware family. Register now! mndt.info/3UJAUGj
Mike Hunhoff (@mehunhoff) 's Twitter Profile Photo

🎉 Looks like dncil (github.com/mandiant/dncil) recently surpassed 15k PyPI downloads! If you’re looking for a Python library to disassemble .NET managed code check out dncil and give us your feedback.

Malchanic (@malwaremechanic) 's Twitter Profile Photo

What better way to finish off the year than a fresh release of FLARE VM?! 🥳 This release focuses on empowering community contributions and automation. Get it while its hot 🔥🔥🔥mandiant.com/resources/blog…

VirusTotal (@virustotal) 's Twitter Profile Photo

We welcome Mandiant (part of Google Cloud)'s CAPA and GoReSym to our malware analysis suite. CAPA provides valuable TTPs, and GoReSym produces all kind of metadata to analyse GO samples: blog.virustotal.com/2023/01/mandia…

We welcome <a href="/Mandiant/">Mandiant (part of Google Cloud)</a>'s CAPA and GoReSym to our malware analysis suite. CAPA provides valuable TTPs, and GoReSym produces all kind of metadata to analyse GO samples: 
blog.virustotal.com/2023/01/mandia…
Mike Hunhoff (@mehunhoff) 's Twitter Profile Photo

We released the second blog post in our FLARE @ GSoC ‘23 blog series. This post is a collaboration with our GSoC contributor Arnav Kharbanda who extended FLOSS to extract strings from Go and Rust executables. Check out the post to learn how it works 👉 mandiant.com/resources/blog…

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🎙️ I'm excited to announce the launch of a new podcast - Behind the Binary! #BehindTheBinary focuses on the stories of the people, technology, and events that have shaped the world of reverse engineering. You can find it on Spotify👇 open.spotify.com/show/3yWgmIuhW…

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Introducing XRefer: a tool from the Mandiant FLARE team to speed up #malwareanalysis and streamline investigations. Learn more: bit.ly/4iUrvrF

Introducing XRefer: a tool from the Mandiant FLARE team to speed up #malwareanalysis and streamline investigations.

Learn more: bit.ly/4iUrvrF