0xrb Profile Banner
R. Profile
R.

@0xrb

Followers
6K
Following
3K
Media
889
Statuses
5K

Reverse Threat Intel | Malware /Threat Hunter | Exploit Research \\ #IoT #Malware #Research, Reverse Engineering, #Botnet C2 #Hijacking

localhost
Joined June 2010
Don't wanna be here? Send us removal request.
@0xrb
R.
5 years
here is the list of more than 4k sub-domain infrastructure including #DGA domain used by #UNC2452 #SolarWinds #backdoor .Link: cc: @iblametom @TheHackersNews @threatpost.
3
32
87
@0xrb
R.
1 month
RT @S0ufi4n3: Just released LLMEx - open-source security testing framework for LLMs: OWASP Top 10+1 for LLMs compliance, Smart false positiโ€ฆ.
0
4
0
@0xrb
R.
1 month
RT @virustotal: What 17,845 GitHub Repos Taught Us About Malicious MCP Servers.
Tweet media one
0
24
0
@0xrb
R.
1 month
RT @infosec_au: IP whitelisting is fundamentally broken. At @assetnote, we've successfully bypassed network controls by routing traffic thrโ€ฆ.
0
237
0
@0xrb
R.
1 month
RT @clintgibler: ๐Ÿ”ฅ ๐€๐ˆ ๐‘๐ž๐ ๐“๐ž๐š๐ฆ๐ข๐ง๐  ๐๐ฅ๐š๐ฒ๐ ๐ซ๐จ๐ฎ๐ง๐ ๐‹๐š๐›๐ฌ from @Microsoft .12 free labs to up-level your hacking skills from the โ€œAI Red Teaming inโ€ฆ.
0
86
0
@0xrb
R.
2 months
RT @g0njxa: ping @ViriBack more #Lumma Stealer ๐Ÿ•Š๏ธ. /fedor-dostoevskiy.com/login
Tweet media one
Tweet media two
0
1
0
@0xrb
R.
3 months
RT @RussianPanda9xx: Autopsy of a Failed Stealer: StealC v2.When Your $3000 Malware Budget Goes to Marketing Instead of Actually Enabling tโ€ฆ.
0
62
0
@0xrb
R.
4 months
RT @Xlab_qax: Our latest blog dives into a new variant of #Vo1d #botnet. C2 sinkhole data reveals it has infected 1.6M Android TVs across 2โ€ฆ.
0
16
0
@0xrb
R.
5 months
RT @0x6rss: hi threat hunters and malware analysts!.I want to introduce you to my newly developed tool called "Matkap". with this tool, youโ€ฆ.
0
168
0
@0xrb
R.
5 months
RT @4A4133:
0
38
0
@0xrb
R.
7 months
RT @securityaffairs: Experts discovered #surveillance tool #EagleMsgSpy used by Chinese law enforcement.#securityafโ€ฆ.
0
3
0
@0xrb
R.
7 months
RT @bofheaded: This is one example of why correct attribution matters in CTI. .CC: @Gi7w0rm @Glacius_ @banthisguy9โ€ฆ.
0
32
0
@0xrb
R.
9 months
RT @Kostastsale: ๐ŸšจEDR Telemetry website is live! ๐Ÿฅณ. I hope this makes it even easier for folks to compare the telemetry of EDR vendors andโ€ฆ.
0
285
0
@0xrb
R.
9 months
RT @4A4133: JA4 is now in VirusTotal!. All the malware using wininet: Executables using winhttp:..
0
36
0
@0xrb
R.
9 months
RT @darkeye_team: ๐ŸŽ‰ DarkEye has officially launched!.๐ŸŽ Grab your 3-day free trialโ€”register now for your free access!.๐Ÿ”— Check it out: https:โ€ฆ.
0
11
0
@0xrb
R.
1 year
RT @nao_sec: New blog post! "Building Casper's Shadow". We discovered and researched the #ShadowPad builder. See how ShadowPad is built ๐Ÿ˜Ž๐Ÿ‘ปโ€ฆ.
0
50
0
@0xrb
R.
1 year
Still ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ #SystemBC #Malware spread from HETZNER-CLOUD2-AS, DE (AS213230), United States (USA). Update : Total Live Compromised Victims: (172) across various countries.๐Ÿ‘‡.Stay vigilant! ๐Ÿ›ก๏ธ#threatintel
Tweet media one
Tweet media two
Tweet media three
0
0
2
@0xrb
R.
1 year
๐Ÿšจ Still, same RaaS affiliated threat actor active! #systembc #malware spreading in the wild. New victims identified across various countries. Total bot/Compromised victim count is (110). ๐Ÿ‘‡.Stay vigilant! โš ๏ธ
Tweet media one
Tweet media two
0
2
6
@0xrb
R.
1 year
RT @HunterMapping: ๐ŸšจAlert๐ŸšจCVE-2024-30103: Microsoft Outlook Remote Code Execution Vulnerability.โš This Microsoft Outlook vulnerability can bโ€ฆ.
0
178
0
@0xrb
R.
1 year
๐Ÿšจ Recent ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ #SystemBC #Malware Commonly used in ransomware campaigns, spreading from Ukraine (UA). C2 IP: 185.156.72.33[:]4001.Hash: a022626b818bb6251e3b814ae74700e0 . Compromised machines (bots) detected also in mostly Ukraine itself ๐Ÿ‘‡ (32 Victims).๐Ÿ›ก๏ธ #threatintel
Tweet media one
0
10
34
@0xrb
R.
1 year
RT @Volexity: .@Volexity analyzes #DISGOMOJI ๐Ÿ”ฅ, Discord-based malware ๐Ÿ’€ using emojis for C2. #DISGOMOJI is used by #UTA0137, a suspected Paโ€ฆ.
0
79
0