Quang Vo (@mr_r3bot) 's Twitter Profile
Quang Vo

@mr_r3bot

Offensive Security Researcher with interest in malware development . Tweets are my own

ID: 1370201236583051266

linkhttps://mr-r3bot.github.io calendar_today12-03-2021 02:33:36

1,1K Tweet

772 Takipçi

764 Takip Edilen

flux (@0xfluxsec) 's Twitter Profile Photo

New post! Crimes against NTDLL - Implementing Early Cascade Injection in Rust: fluxsec.red/implementing-e… Original research by Outflank

New post! Crimes against NTDLL - Implementing Early Cascade Injection in Rust: fluxsec.red/implementing-e… 

Original research by <a href="/OutflankNL/">Outflank</a>
Antonia Frances 💙🦕 (@antoniafrances) 's Twitter Profile Photo

His name is Bao Phuc Cao. He is a biomedicine student at Melbourne University. Despite filming hundreds of women in public toilets he has walked free from court without a conviction. The courts won’t do their job so let’s make him famous.

His name is Bao Phuc Cao. He is a biomedicine student at Melbourne University. Despite filming hundreds of women in public toilets he has walked free from court without a conviction. The courts won’t do their job so let’s make him famous.
klez (@klezvirus) 's Twitter Profile Photo

[RELEASE] Better late than never! Part 3 is out! Fantastic unwind information and where to find them. We went digging through .pdata, RTF Lookups, and a few ntdll internals that probably weren't meant to be touched. BYOUD dropping alongside. Enjoy 😉 klezvirus.github.io/posts/Byoud/

Unit 42 (@unit42_intel) 's Twitter Profile Photo

Boggy Serpens, an Iranian state-sponsored threat group, now uses AI-assisted malware development and advanced evasion techniques. Our research details their evolving cyberespionage tactics. Read the full analysis to understand their techniques: bit.ly/4cNmLTZ

Boggy Serpens, an Iranian state-sponsored threat group, now uses AI-assisted malware development and advanced evasion techniques. Our research details their evolving cyberespionage tactics. Read the full analysis to understand their techniques: bit.ly/4cNmLTZ
Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

New blog post: Building a Pipeline for Agentic Malware Analysis Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage Link: synthesis.to/2026/03/18/age… Github: github.com/mrphrazer/agen…

New blog post: Building a Pipeline for Agentic Malware Analysis

Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage

Link: synthesis.to/2026/03/18/age…

Github: github.com/mrphrazer/agen…
Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Elastic Security Labs has been observing malicious campaigns delivering a multi-stage infection involving a previously undocumented loader. The SILENTCONNECT loader delivers ScreenConnect - a RMM tool used to control victim machines - as its final payload. elastic.co/security-labs/…

Elastic Security Labs has been observing malicious campaigns delivering a multi-stage infection involving a previously undocumented loader. The SILENTCONNECT loader delivers ScreenConnect - a RMM tool used to control victim machines - as its final payload. elastic.co/security-labs/…
Gen Threat Labs (@genthreatlabs) 's Twitter Profile Photo

🔎New #ABE #bypass spotted ITW #VoidStealer is the first #infostealer to weaponize a debugger-based technique that extracts the v20_master_key straight from browser memory, requiring neither privilege escalation nor code injection, making it significantly stealthier than

Hunt.io (@huntio) 's Twitter Profile Photo

📌 Looking Back: Iranian APT Infrastructure in Focus hunt.io/blog/iranian-a… Two weeks ago, we analyzed infrastructure linked to several Iranian-aligned threat groups. Pivoting across IPs, hashes, ASNs, and TLS certificates revealed clusters tied to actors like MuddyWater and

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

FOX-IT & NCC Group report an SEO poisoning campaign active since Oct 2025, using fake download sites for 25+ popular apps to push malicious installers. Victims get ScreenConnect for initial access, then AsyncRAT with a crypto clipper, plugins & geo-fencing nccgroup.com/research/async…

FOX-IT &amp; NCC Group report an SEO poisoning campaign active since Oct 2025, using fake download sites for 25+ popular apps to push malicious installers. Victims get ScreenConnect for initial access, then AsyncRAT with a crypto clipper, plugins &amp; geo-fencing nccgroup.com/research/async…
Silky (@s1lky_1337) 's Twitter Profile Photo

Releasing KslKatz. Combining KslDump and GhostKatz to dump LSASS using no-fix KslD.sys memory read to bypass PPL. Extracts MSV1_0 NT hashes and WDigest cleartext passwords (if enabled) from LSASS using a Microsoft-signed driver. github.com/S1lkys/KslKatz

Releasing KslKatz. Combining KslDump and GhostKatz to dump LSASS using no-fix KslD.sys memory read to bypass PPL. Extracts MSV1_0 NT hashes and WDigest cleartext passwords (if enabled) from LSASS using a Microsoft-signed driver.
github.com/S1lkys/KslKatz
MalDev Academy (@maldevacademy) 's Twitter Profile Photo

We released a new public tool, 3LayersPersistence, that demonstrates 3 different persistence layers implemented in one executable. github.com/Maldev-Academy… The implementation uses WMI event subscriptions, DLL sideloading, and COM hijacking in a single workflow, with the