Kiet (@lqkiet19) 's Twitter Profile
Kiet

@lqkiet19

ID: 1769568632974221313

calendar_today18-03-2024 03:37:04

5 Tweet

0 Followers

129 Following

LaurieWired (@lauriewired) 's Twitter Profile Photo

Just built an MCP for Ghidra. Now basically any LLM (Claude, Gemini, local...) can Reverse Engineer malware for you. With the right prompting, it automates a *ton* of tedious tasks. One-shot markups of entire binaries with just a click. Open source, on Github now.

Duncan Ogilvie 🍍 (@mrexodia) 's Twitter Profile Photo

🔥 TitanHide has been updated to support the latest VMProtect 3.9.4 changes! The service name is now used as the device name as well, so the check for \\.\TitanHide will fail if you name the service differently 🧠

🔥 TitanHide has been updated to support the latest VMProtect 3.9.4 changes!

The service name is now used as the device name as well, so the check for \\.\TitanHide will fail if you name the service differently 🧠
ö (@r0keb) 's Twitter Profile Photo

Good morning! Just published a deep dive into PatchGuard internals: how it works, key internal functions, context init, and possible bypasses. r0keb.github.io/posts/PatchGua…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Verichains Cyber Force chained two unique bugs - including an auth bypass - to exploit the Synology DS925+ and run code as root. Their work earns them $20,000 and 4 Master of Pwn points. #Pwn2Own

Confirmed! Verichains Cyber Force chained two unique bugs - including an auth bypass - to exploit the Synology DS925+ and run code as root. Their work earns them $20,000 and 4 Master of Pwn points. #Pwn2Own
Zeroed (@zeroedtech) 's Twitter Profile Photo

I've recently been experimenting with using .NET profilers to hook .NET functions under IIS and decided to write up a blog post while it was fresh in my mind zeroed.tech/blog/hooking-n…

João Vitor(Keowu) (@keowu) 's Twitter Profile Photo

My new article, “Ryūjin – Writing a Bin2Bin Obfuscator from Scratch for Windows PE x64 and Fully Deobfuscating It,” covers in detail the creation of a own Bin2Bin obfuscator tool, named “Ryūjin". Check it out: keowu.re/posts/Ry%C5%AB…

Mr. OS (@ksg93rd) 's Twitter Profile Photo

#tools #reversing #Kernel_Security Using MCP for Debugging, Reversing, and Threat Analysis Part 0 - AI Meets WinDBG - svnscha.de/posts/ai-meets… ]-> MCP Server for WinDbg Crash Analysis - github.com/svnscha/mcp-wi… Part 1 - Setting up VS Code, MCP Server, and WinDbg crashdump analysis

blackorbird (@blackorbird) 's Twitter Profile Photo

Extract SAM and SYSTEM using Volume Shadow Copy (VSS) API. With multiple exfiltration options and XOR obfuscation github.com/ricardojoserf/…

Extract SAM and SYSTEM using Volume Shadow Copy (VSS) API. With multiple exfiltration options and XOR obfuscation 

github.com/ricardojoserf/…
Silky (@s1lky_1337) 's Twitter Profile Photo

Dropping a new article. It's about a new local privilege escalation technique that becomes viable when a writable system path is present. Yet another technique. It uses Windows Audio for escalation and doesn't require system reboots. medium.com/@S.1.l.k.y/abu…

Daax (@daaximus) 's Twitter Profile Photo

Dropping some tooling to assist with Windows RE (or any really); bulk download modules across all versions, search for call chains from references, immediates, instructions, etc. Has been useful for mass-analysis, cross-version diffing, variant analysis, and just generally

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

AV/EDR Lab Environment Setup A curated list of various resources helpful in building own malware-centric research lab. A post by Udayveer Singh (Udayveer Singh) Source: an0nud4y.notion.site/AV-EDR-Lab-Env… #redteam #blueteam #maldev #malwaredevelopment