0xThiebaut Profile Banner
Maxime Thiebaut Profile
Maxime Thiebaut

@0xThiebaut

Followers
721
Following
747
Media
27
Statuses
93

308 Permanent Redirect Location: https://t.co/xKLuDM5iDl 🇧🇪🕊🇺🇦

Joined January 2019
Don't wanna be here? Send us removal request.
@0xThiebaut
Maxime Thiebaut
4 years
Received the NVISO #Innovation Coin joining a growing hall of fame 🎉 If you’re looking to work with #SANS legends, we’re #hiring in every field! Come have a chat & drink: https://t.co/hm2HC0jb3t 🍻
1
5
17
@NVISO_Labs
NVISO Labs
2 months
On September 29th, 2025, Broadcom disclosed a local privilege escalation vulnerability, CVE-2025-41244, impacting VMware’s guest service discovery features. NVISO has identified zero-day exploitation in the wild beginning mid-October 2024. All details -
Tweet card summary image
blog.nviso.eu
NVISO has identified zero-day exploitation of CVE-2025-41244, a local privilege escalation vulnerability impacting VMware's guest service discovery features.
0
14
29
@Andrew___Morris
Andrew Morris (afk)
1 year
6
21
126
@NVISO_Labs
NVISO Labs
1 year
New blog post! Title: Hunting Chromium Notifications | By @0xThiebaut (Maxime Thiebaut) Link: https://t.co/kgG8pPqFaU #ThreatHunting #Phishing #Chromium #Chrome #Edge #Forensics
0
5
20
@mer__edith
Meredith Whittaker
1 year
Respectfully, your proposal does break encryption. I am happy to spend as much time as you need reviewing in as much detail as you are comfortable with exactly how it breaks encryption, and why this is so dangerous.
@VeraJourova
Věra Jourová
1 year
Let me clarify one thing about our draft law to detect online child sexual abuse #CSAM. Our proposal is not breaking encryption. Our proposal preserves privacy and any measures taken need to be in line with EU privacy laws.
74
949
4K
@bcsecurity
BC Security
1 year
ScriptBlock Smuggling is a new technique, developed by @_Hubbl3 & @Cx01N_ that allows that allows for the spoofing of PowerShell security logs & bypasses AMSI without the need for reflection or memory patching. Learn all about in our new blog post! https://t.co/OPI7A9sK4f
6
187
416
@TheDFIRReport
The DFIR Report
2 years
Tune in now!
@TheDFIRReport
The DFIR Report
2 years
Join us today at 4:00 pm ET (8:00 pm UTC) at the #RansomwareSummit to discuss the "Evolution of Ransomware Tactics in 2023 - Insights from The DFIR Report" Shout-out to our analysts (@_pete_0 & @0xThiebaut) who have been working on this presentation for months!
1
13
50
@sansforensics
SANS DFIR
2 years
We're closing out today's #RansomwareSummit w/ @_pete_0 & @0xThiebaut exploring the evolving landscape of #ransomware tactics and strategies, providing actionable insights for bolstering #cybersecurity defenses. Register Free to Join / Access Recordings: https://t.co/mtPudWN90Q
0
1
5
@sansforensics
SANS DFIR
2 years
At #RansomwareSummit, @_pete_0 & @0xThiebaut will explore the evolving landscape of #Ransomware tactics and strategies, providing actionable insights for bolstering #Cybersecurity defenses. Register for Free Live Online: https://t.co/mtPudWN90Q
0
2
11
@NVISO_Labs
NVISO Labs
2 years
New blog post! Title: Covert TLS n-day backdoors: SparkCockpit & SparkTar | by NVISO Incident Response Link: https://t.co/Gmf1dHMs1j #Forensics #ReverseEngineering #CVE #Ivanti #PulseSecure
Tweet card summary image
blog.nviso.eu
This report documents two covert TLS-based backdoors identified by NVISO: SparkCockpit & SparkTar.
1
15
24
@TheDFIRReport
The DFIR Report
2 years
From ScreenConnect to Hive Ransomware in 61 hours ➡️Initial Access: ScreenConnect ➡️Defense Evasion: BITS Jobs, Embedded Payloads ➡️Lateral Movement: Impacket, RDP, SMB ➡️C2: ScreenConnect, Atera, Splashtop, Cobalt Strike, Metasploit ➡️Exfil: Rclone https://t.co/0rOKnoHnbR 1/X
Tweet card summary image
thedfirreport.com
In 2022, The DFIR Report observed an increase in the adversarial usage of Remote Management and Monitoring (RMM) tools. When compared to post-exploitation channels that heavily rely on terminals, s…
2
168
420
@Kostastsale
Kostas
2 years
@JAMESWT_MHT Awesome article, and here is the tool that came with it put together by @0xThiebaut: https://t.co/ZuCa1shc1P Works like a charm; I used it more than once 🙂
Tweet card summary image
github.com
A proof-of-concept re-assembler for reverse VNC traffic. - 0xThiebaut/PCAPeek
0
10
13
@malwrhunterteam
MalwareHunterTeam
2 years
Got the account locked because of DMCA. 🤦‍♂️ Forget to screenshot the step after the first screenshot, but anyway, it did not include which tweet got reported and by who, should check emails it said. So going to check now...
5
16
63
@TheDFIRReport
The DFIR Report
3 years
A Truly Graceful Wipe Out ➡️Initial Access: Email > TDS > Truebot download ➡️Credentials: LSASS & Registry Dump ➡️Persistence: Scheduled Task ➡️C2: Truebot, FlawedGrace, Cobalt Strike ➡️Exfiltration: FlawedGrace ➡️Impact: MBR Killer https://t.co/qcAYmPmSPB 1/X
Tweet card summary image
thedfirreport.com
In this intrusion, dated May 2023, we observed Truebot being used to deploy Cobalt Strike and FlawedGrace (aka GraceWire & BARBWIRE) resulting in the exfiltration of data and the deployment of …
1
161
353
@TheDFIRReport
The DFIR Report
3 years
A new report will be out June 12th by @Kostastsale, @svch0st & @0xThiebaut! This report will have a few things we haven't covered before, you won't want to miss it! Want to receive an email when we publish the report? Subscribe below https://t.co/oPX1ir9O13
Tweet card summary image
thedfirreport.com
If you would like to receive an email when we publish a new report, please type your email address below and press subscribe. If you do not receive the confirmation email within a few minutes, plea…
2
26
110
@cyb3rops
Florian Roth ⚡️
3 years
1
1
3
@NVISO_Labs
NVISO Labs
3 years
🔎 IcedID’s VNC Backdoors: Dark Cat, Anubis & Keyhole A summary of #VNC #backdoor capabilities @0xThiebaut reconstructed from network traffic. 👀 Screenshots, videos and clipboard data at https://t.co/GXiZ3nICTH #Malware #PCAP #Reversing
Tweet card summary image
blog.nviso.eu
In this post we introduce Dark Cat, Anubis and Keyhole, three IcedID & Qakbot VNC backdoor variants NVISO observed. We'll follow by exposing TTPs and information leaked through the attackers'...
2
56
97
@0xThiebaut
Maxime Thiebaut
3 years
A few weeks ago Microsoft released #CVE_2022_41120, a “Microsoft Windows #Sysmon Elevation of Privilege Vulnerability” reported by @filip_dragovic . With the #vulnerability and original #PoC released, I can now share the first time I #diff'ed a patch.
thiebaut.dev
My first BinDiff: Checking the Sysmon v14.11 patch to turn a ClipboardChange event into arbitrary writing.
@filip_dragovic
Filip Dragovic
3 years
Here is PoC for CVE-2022-41120 https://t.co/oXkBYi4bWk. I combined arb file delete and limited arb file write to get code execution as NT Authority\System.
2
1
11
@0xThiebaut
Maxime Thiebaut
3 years
@NinjaParanoid
Chetan Nayak (Brute Ratel C4 Author)
3 years
Brc4 v1.2.2/5 was leaked by MdSec and is circling the internet. I am tracking it over the past few weeks. MdSec uploaded the whole package to VT which was cracked by a Russian group Molecules, and now used by TAs which will most likely create an irrepairable damage. blog incoming
0
0
5