sh4hin (@s3cdev) 's Twitter Profile
sh4hin

@s3cdev

Threat Emulation/Hunting | Linux/Mac enthusiast

ID: 843399295

linkhttps://github.com/sh4hin calendar_today24-09-2012 11:15:25

410 Tweet

979 Followers

4,4K Following

SpecterOps (@specterops) 's Twitter Profile Photo

A new .NET command and control platform: Covenant by Ryan Cobb is being released today. Check it out here: posts.specterops.io/entering-a-cov…

DW (@davewestgard) 's Twitter Profile Photo

If your org is starting a threat hunting program and you want to start somewhere simple, I've built a table with some common use cases and linked them to ATT&CK framework and added some Hybrid Analysis samples. Hope this helps. github.com/dwestgard/thre…

b33f | 🇺🇦✊ (@fuzzysec) 's Twitter Profile Photo

Working on a side project I had to use the SystemProcessAndThreadsInformation class in NtQuerySystemInformation. I wrote a small wrapper which may help as a code reference if you want to do something similar => github.com/FuzzySecurity/…

Working on a side project I had to use the SystemProcessAndThreadsInformation class in NtQuerySystemInformation. I wrote a small wrapper which may help as a code reference if you want to do something similar =>  github.com/FuzzySecurity/…
Security Response (@msftsecresponse) 's Twitter Profile Photo

We are excited to announce higher Azure bounties and a new space for Azure research! The Azure Security Lab is a set of dedicated hosts that researchers can use to probe IaaS security without affecting customers. To find out more, see our blog. msrc-blog.microsoft.com/2019/08/05/azu…

Jai Minton (@cyberraiju) 's Twitter Profile Photo

10th Chapter (Kernel Debugging) of Practical Malware Analysis (No Starch Press) complete. Just about hit the half way mark of this write-up. Write-ups take significantly longer than just reading content, but if it helps someone learn, then it's worth it. jaiminton.com/Tutorials/Prac…

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

NimGetSyscallStub is now public, the first public fully working (didn't find another myself) Nim imlementation + PoC to grab fresh Syscalls from disk on runtime: github.com/S3cur3Th1sSh1t… Cas van Cooten even with a yara rule (with your template 🤓)

NimGetSyscallStub is now public, the first public fully working (didn't find another myself) Nim imlementation + PoC to grab fresh Syscalls from disk on runtime:

github.com/S3cur3Th1sSh1t…

<a href="/chvancooten/">Cas van Cooten</a> even with a yara rule (with your template 🤓)
Moritz (@m_r_tz) 's Twitter Profile Photo

Check out capa v4 with: 1. support for analyzing .NET executables 2. finer grained capability detection via instruction and operand features 3. many new and updated detection rules Blog: mandiant.com/resources/blog… Binaries: github.com/mandiant/capa/… Source: github.com/mandiant/capa

diversenok (@diversenok_zero) 's Twitter Profile Photo

I'm happy to share the results of months of research on code injection, process tampering, and their detection! 🥳 Here you'll find technique categorization, a dive into the underlying OS mechanisms, sample demos, detection suggestions, and much more: huntandhackett.com/blog/concealed…

Matthew (@embee_research) 's Twitter Profile Photo

Reverse Engineering a #CobaltStrike #malware sample and extracting C2's using three different methods. We'll touch on #cyberchef, #x64dbg and Speakeasy from fireeye to perform manual analysis and emulation of #shellcode. A (big) thread ⬇️⬇️ [1/23]

Reverse Engineering a #CobaltStrike #malware sample and extracting C2's using three different methods. 

We'll touch on #cyberchef, #x64dbg and Speakeasy from fireeye to perform manual analysis and emulation of #shellcode.  

A (big) thread ⬇️⬇️
[1/23]
Matt Zorich (@reprise_99) 's Twitter Profile Photo

In nearly all of our on-premises engagements, a threat actor has taken total full control of Active Directory. If you are interested in the kind of things Microsoft DART finds, and how we recommend you secure Active Directory, then this blog is for you - techcommunity.microsoft.com/t5/microsoft-s…