0xreversecom Profile Banner
0xReverse Profile
0xReverse

@0xreversecom

Followers
227
Following
80
Media
0
Statuses
10

Security Research Group

Joined November 2024
Don't wanna be here? Send us removal request.
@rhotav
Utku Çorbacı
1 month
pyinjector-rs / A Windows process injector written in Rust that injects and executes Python codes Thanks to @luminaryxd for giving me the idea. I think this project can be used in some things that use PYTHON RUNTIME.😄 https://t.co/bWrpr9bnoN
Tweet card summary image
github.com
A Windows process injector written in Rust that injects and executes Python codes - rhotav/pyinjector-rs
0
29
133
@0xreversecom
0xReverse
4 months
An advanced parser that can be used to parse .NET assemblies. It can be used for many tasks such as Config Extractor, Assembly Analysis by @rhotav
@rhotav
Utku Çorbacı
4 months
dnpy - A Python library for reading .NET assemblies. It's not finished yet, but its current state is sufficient for many tasks. Using only dnpy (without needing another project), you can parse a .NET assembly, iterate through its methods, and read its instructions.
0
0
11
@0xreversecom
0xReverse
4 months
Its ability to bypass EDR/XDR systems and impact banks, ISPs, and mid-level organizations in Türkiye underscores the need for on-premises sandboxes, supported by https://t.co/PyuPW9hw42's hypervisor-based approach, which offers deeper malware visibility than cloud-based
Tweet card summary image
threat.zone
Threat.Zone is a hypervisor-powered agentless malware analysis platform with dynamic sandboxing, deep network insights, and cloud or on-premise deployment.
0
0
1
@0xreversecom
0xReverse
4 months
The malware employs a three-stage loader, including TOR for anonymous C&C communication and persistence via scheduled tasks. 🧵 (2/3)
1
0
2