0xrb Profile Banner
R. Profile
R.

@0xrb

Followers
6K
Following
3K
Media
889
Statuses
5K

Reverse Threat Intel | Malware /Threat Hunter | Exploit Research \\ #IoT #Malware #Research, Reverse Engineering, #Botnet C2 #Hijacking

localhost
Joined June 2010
Don't wanna be here? Send us removal request.
@blackorbird
blackorbird
19 days
CVE-2025-55182 (React) and CVE-2025-66478 (Next.js) are critical unauthenticated RCE vulnerabilities in the React Server Components (RSC) "Flight" protocol. Default configurations are vulnerable โ€“ a standard Next.js app created with create-next-app and built for production can
2
4
46
@watchtowrcyber
watchTowr
1 month
another exploited in-the-wild FortiWeb vuln? It must be Thursday!
7
119
416
@fr0gger_
Thomas Roccia ๐Ÿค˜
2 months
Awesome new threat report from Google Threat Intel Group documenting how threat actors are leveraging Gemini. A lot of information and actionable avalable in the report! Great work ๐Ÿ‘Œ https://t.co/0ktEQbUhmq
4
138
527
@threatinsight
Threat Insight
2 months
Proofpoint threat researchers have designed an open-source toolโ€”named PDF Object Hashingโ€”to track and detect the unique characteristics of PDFs used by threat actors... similar to a digital fingerprint. ๐Ÿซ† We use this tool internally to help track multiple threat actors with
0
45
164
@wiz_io
Wiz
3 months
๐Ÿ’ฅ Wiz Research has uncovered a critical Redis vulnerability that's been hiding for 13 years We found RediShell (CVE-2025-49844): an RCE bug in Redis that affects every version of Redis out there. It's rated CVSS 10 - the highest severity possible. The vulnerability lets
7
171
524
@_CPResearch_
Check Point Research
3 months
๐Ÿšจ Rhadamanthys v0.9.2 is here! Whatโ€™s new in this multi-layered stealerโ€™s latest evolution? We break down the updates, tactics, and what defenders need to know. Dive into our blog for the full analysis. https://t.co/b5SL8bWR81
Tweet card summary image
research.checkpoint.com
Research by: hasherezade Highlights Introduction Rhadamanthys is a complex, multi-modular malware sold on the underground market since September 2022. It was first advertised by the actor โ€œkingcret...
0
32
113
@ESETresearch
ESET Research
4 months
#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6
56
674
3K
@S0ufi4n3
Soufiane
7 months
Just released LLMEx - open-source security testing framework for LLMs: OWASP Top 10+1 for LLMs compliance, Smart false positive reduction, Works with OpenAI + custom APIs, Extensible for custom tests, and much more. Checkit out: https://t.co/HAV56nFAhL
1
4
19
@virustotal
VirusTotal
7 months
What 17,845 GitHub Repos Taught Us About Malicious MCP Servers https://t.co/y5yniBI1y3
0
25
71
@infosec_au
shubs
7 months
IP whitelisting is fundamentally broken. At @assetnote, we've successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we're releasing Newtowner, to help test for this issue:
Tweet card summary image
github.com
Abuse trust-boundaries to bypass firewalls and network controls - assetnote/newtowner
14
239
880
@clintgibler
Clint Gibler
7 months
๐Ÿ”ฅ ๐€๐ˆ ๐‘๐ž๐ ๐“๐ž๐š๐ฆ๐ข๐ง๐  ๐๐ฅ๐š๐ฒ๐ ๐ซ๐จ๐ฎ๐ง๐ ๐‹๐š๐›๐ฌ from @Microsoft 12 free labs to up-level your hacking skills from the โ€œAI Red Teaming in Practiceโ€ Black Hat training, covering: - Credential exfiltration - Extracting a secret from the metaprompt - Indirect prompt
2
86
261
@g0njxa
Who said what?
7 months
ping @ViriBack more #Lumma Stealer ๐Ÿ•Š๏ธ /fedor-dostoevskiy.com/login
@g0njxa
Who said what?
7 months
After the announcement of seizure of some of the Lumma Stealer panel domains, new ones were opened shortly in the following hours. Please remember that the whole activity has not ceased๐Ÿ‘€ /yuriy-andropov.com @ViriBack
0
1
11
@RussianPanda9xx
RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ
9 months
Autopsy of a Failed Stealer: StealC v2 When Your $3000 Malware Budget Goes to Marketing Instead of Actually Enabling the Encryption Function I did some analysis on the updated #StealC v2. The blog comes with config extractor, hunting queries and Yara rule. Let me know your
7
62
185
@Xlab_qax
Xlab
10 months
Our latest blog dives into a new variant of #Vo1d #botnet. C2 sinkhole data reveals it has infected 1.6M Android TVs across 200+ countries. Now leveraging RSA , its network can remains secure even if researchers register DGA C2s
Tweet card summary image
blog.xlab.qianxin.com
Prologue On February 24, 2025, NBC News reported: "Unauthorized AI-generated footage suddenly played on televisions at the U.S. Department of Housing and Urban Development (HUD) headquarters in...
1
16
29
@0x6rss
0x6rss
10 months
hi threat hunters and malware analysts! I want to introduce you to my newly developed tool called "Matkap". with this tool, you can infiltrate telegram bots(malbots) associated with malware, gain access to their messages, and extract all their logs! โžก๏ธ https://t.co/JVGcnQsWcR
11
172
1K
@4A4133
John Althouse
11 months
4
39
170
@Kostastsale
Kostas
1 year
๐ŸšจEDR Telemetry website is live! ๐Ÿฅณ I hope this makes it even easier for folks to compare the telemetry of EDR vendors and visualize their visibility gaps ๐Ÿ™‚ โ€ฃ Website๐Ÿ”— https://t.co/mTj9lJzE3J โ€ฃ GitHub ๐Ÿ”— https://t.co/7Qf4wXam7r **Telemetry results reflect the most recent
@Kostastsale
Kostas
1 year
I created the first draft of a website for the EDR telemetry project to help people quickly compare vendor telemetry visibility. What do you think about it? Are there any specific features you want to see for the website? Built with ChatGPT 4o with canvas (wanted to test it
19
283
900
@4A4133
John Althouse
1 year
JA4 is now in VirusTotal! All the malware using wininet: https://t.co/9gqTh5JJGP Executables using winhttp: https://t.co/a37lUKG4EL Remember, it is the combination of JA4+ fingerprints that build high fidelity detection. Rarely is JA4 a silver bullet on its own. For example,
2
36
154