Myrtus (@myrtus0x0) 's Twitter Profile
Myrtus

@myrtus0x0

Malware Researcher | Developer | @Cryptolaemus1 | @NVIDIA

Done with this shit platform

bsky: [email protected]

ID: 1104915097112076288

linkhttps://malwareindepth.com calendar_today11-03-2019 01:21:02

4,4K Tweet

7,7K Followers

695 Following

5pider (@c5pider) 's Twitter Profile Photo

Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! infinitycurve.org/blog/introduct…

RE//verse (@reverseconf) 's Twitter Profile Photo

Ticket sales are live! You can sign up for all trainings and conference tickets now. Our round 1 tickets are even cheaper than last year, but the price will be going up for round 2 and 3. re-verse.io

Sam Thomas (@xorpse) 's Twitter Profile Photo

I'm pleased to announce a new version of the Rust bindings for Hex-Rays SA IDA Pro! With: - Improved strings, metadata, and core APIs - Support for the name API Thank you to [email protected] & Willi Ballenthin for contributing! Docs: idalib.rs Code: git.idalib.rs

I'm pleased to announce a new version of the Rust bindings for <a href="/HexRaysSA/">Hex-Rays SA</a> IDA Pro! With:

- Improved strings, metadata, and core APIs
- Support for the name API

Thank you to <a href="/0xdea/">raptor@infosec.exchange</a> &amp; <a href="/williballenthin/">Willi Ballenthin</a> for contributing!

Docs: idalib.rs
Code: git.idalib.rs
Christian Blichmann 🇺🇦 (on bksy and Mastodon) (@admvonschneider) 's Twitter Profile Photo

Exciting! Vector 35's excellent #BinaryNinja ships with built-in BinExport in the latest dev version! Here's how to use it with #BinDiff: dev-docs.binary.ninja/guide/binexpor…

Exciting! <a href="/vector35/">Vector 35</a>'s excellent #BinaryNinja ships with built-in BinExport in the latest dev version!
Here's how to use it with #BinDiff: dev-docs.binary.ninja/guide/binexpor…
CHA Minseok(Jacky) (@mstoned7) 's Twitter Profile Photo

Malware Archaeology : Cascade (1701, 1704) virus. It is a computer virus that was discovered in 1987 and was discovered in South Korea in January 1990. xcoolcat7.tistory.com/91555 (Korean)

Greg Lesnewich (@greglesnewich) 's Twitter Profile Photo

As mentioned on the stream, we are giving away a voucher to Steve YARA Synapse Miller ‘s YARA course Check stream for details and reply to any of the social posts with the rules that inspired you to win! networkdefense.co/courses/yara/

As mentioned on the stream, we are giving away a voucher to <a href="/stvemillertime/">Steve YARA Synapse Miller</a> ‘s YARA course 

Check stream for details and reply to any of the social posts with the rules that inspired you to win!  

networkdefense.co/courses/yara/
anubis (@anubisonsec) 's Twitter Profile Photo

Hiring a junior/mid role on my team for a Red Team operator, feel free to DM me with any questions or anything nvidia.wd5.myworkdayjobs.com/NVIDIAExternal…

Alan Sguigna (@alansguigna) 's Twitter Profile Photo

Here are the links to the recordings of my prior two webinars: Debug of Hyper-V, Secure Kernel, VBS Enclaves, Defender, and other secrets: attendee.gotowebinar.com/recording/3590… and Advanced Threat Analysis and Reverse Engineering using AI: attendee.gotowebinar.com/recording/4436…

Here are the links to the recordings of my prior two webinars:
Debug of Hyper-V, Secure Kernel, VBS Enclaves, Defender, and other secrets: attendee.gotowebinar.com/recording/3590…
and Advanced Threat Analysis and Reverse Engineering using AI: attendee.gotowebinar.com/recording/4436…
Padawan (@johnk3r) 's Twitter Profile Photo

🛑 Heads-up: #num2words v0.5.15 (just dropped on PyPI) may be #compromised. Early signs probably link it to #Scavenger, the same threat actor behind previous software supply chain intrusions. Malware Utkonos Tony/Humpty Invoke RE

🛑 Heads-up: #num2words v0.5.15 (just dropped on PyPI) may be #compromised.

Early signs probably link it to #Scavenger, the same threat actor behind previous software supply chain intrusions.

<a href="/MalwareUtkonos/">Malware Utkonos</a> <a href="/cyb3rjerry/">Tony/Humpty</a> <a href="/InvokeReversing/">Invoke RE</a>
Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

New to #malware analysis? Then you’ll definitely want to check out this deep dive into Babuk #ransomware using #IDAPro—the perfect starting point for beginners looking to sharpen their #reverseengineering skills: eu1.hubs.ly/H0m4TxH0

New to #malware analysis? Then you’ll definitely want to check out this deep dive into Babuk #ransomware using #IDAPro—the perfect starting point for beginners looking to sharpen their #reverseengineering skills: eu1.hubs.ly/H0m4TxH0
hasherezade (@hasherezade) 's Twitter Profile Photo

I updated the #Rhadamanthys custom format converter (for XS modules), to support the latest version (0.9.x): github.com/hasherezade/hi…