PhysicalDrive0 (@physicaldrive0) 's Twitter Profile
PhysicalDrive0

@physicaldrive0

Malware Hunter / I've already taken the red pill!

ID: 218798348

calendar_today23-11-2010 09:12:58

22,22K Tweet

16,16K Followers

924 Following

RedDrip Team (@reddrip7) 's Twitter Profile Photo

#CVE-2018-8453 deep analysis, from Use After Free to arbitrary memory read/write by 360 Threat Intelligence Center, a follow up of vulnerability being used by #FruityArmor group targeting the Middle East. ti.360.net/blog/articles/… the video:video.twimg.com/tweet_video/Dx…

Airbus Security Lab (@airbusseclab) 's Twitter Profile Photo

Version 1.1 of BinCAT, our static binary code analyzer for reversers, was just released, with long awaited AMD64 support and huge performance improvements. Get it there: github.com/airbus-seclab/…

Version 1.1 of BinCAT, our static binary code analyzer for reversers, was just released, with long awaited AMD64 support and huge performance improvements. Get it there: github.com/airbus-seclab/…
alex (@insertscript) 's Twitter Profile Photo

CVE-2018-16858 - My writeup about a RCE vulnerability via macro execution in Libreoffice: insert-script.blogspot.com/2019/02/libreo…

Vitali Kremez (@vk_intel) 's Twitter Profile Photo

2019-02-08: #ExileRAT Group: "CVE-2017-8759" altered toolkit "get_robin.py" server thread w/ local logging { SHELLCODE1 = 'sc.dat' as JScript | LOG_FILE = 'robins.log' } h/t PhysicalDrive0 Original Research 👍 -> x.com/TalosSecurity/…

2019-02-08: #ExileRAT Group:
"CVE-2017-8759" altered toolkit "get_robin.py" server thread w/ local logging 
{ SHELLCODE1 = 'sc.dat' as JScript | LOG_FILE   = 'robins.log' }
h/t <a href="/PhysicalDrive0/">PhysicalDrive0</a> 
Original Research 👍 -&gt;
x.com/TalosSecurity/…
Chaouki Bekrar (@cbekrar) 's Twitter Profile Photo

Google discovered a Chrome RCE #0day in the wild (CVE-2019-5786). Reportedly, a full chain with a sandbox escape: chromereleases.googleblog.com/2019/03/stable… In 2019, I expect epic 0days to be found in the wild: Android, iOS, Windows, Office, virtualization, and more. Stay safe and enjoy the show.

360 Threat Intelligence Center (@360coresec) 's Twitter Profile Photo

Microsoft fixed a Windows 0day (CVE-2019-0808) in Patch Tuesday. Our team constructed the POC and reproduced the vulnerability triggering process. Click here to read more: blogs.360.cn/post/RootCause…

PhysicalDrive0 (@physicaldrive0) 's Twitter Profile Photo

WINRAR EXPLOIT BUILDER Select your malware file and upload it and your malicious RAR-file will be created hxxp://lofi.stream cve-2018-20250

WINRAR EXPLOIT BUILDER
Select your malware file and upload it and your malicious RAR-file will be created
hxxp://lofi.stream cve-2018-20250
Ajax (@commial) 's Twitter Profile Photo

Now, Sibyl can be called from sigpwn (github.com/cea-sec/Sibyl/…) or use it headless for function address discovering (github.com/cea-sec/Sibyl/…) :)

Now, Sibyl can be called from <a href="/GHIDRA_RE/">sigpwn</a> (github.com/cea-sec/Sibyl/…) or use it headless for function address discovering (github.com/cea-sec/Sibyl/…) :)