CryptDeriveKey Profile Banner
estrellas Profile
estrellas

@CryptDeriveKey

Followers
361
Following
4K
Media
50
Statuses
547

Reverse engineer mostly interested in SAT/SMT solvers, Program Analysis, and Obfuscation. Views are my own.

Joined March 2020
Don't wanna be here? Send us removal request.
@CryptDeriveKey
estrellas
5 days
0
0
2
@CryptDeriveKey
estrellas
2 months
Lately I've been working in my very own binary lifter... As part of the documentation process, I decided to write a few words about my implementation of static recovery of a given function's control flow graph. Hope you enjoy it! https://t.co/4e1tBzWlYv
2
11
46
@0x6D6172636F
смех
4 months
Additional info on the Fancy Bear kit being reported on. Cheers to @Laughing_Mantis for writing backdoors so good that APTs plagiarize it. https://t.co/4mBI2jNY34
Tweet card summary image
kroll.com
Kroll has observed GONEPOSTAL malware used in an espionage campaign attributed to KTA007 (Fancy Bear, APT28). Read more
0
11
28
@CryptDeriveKey
estrellas
7 months
Our ongoing research about a drive-by compromise that affects even pre-installed versions of the application just had its first part released! You can read it at:
Tweet card summary image
kroll.com
Beginning in early April 2025, Kroll has observed a large wave of malicious activity surrounding "PDFast" software. It is highly recommended to remove installations of PDFast and block the domains...
0
1
7
@maidenlabsAI
Maiden Labs 🧠
7 months
maiden :3
7
17
162
@CryptDeriveKey
estrellas
8 months
0
0
0
@miltinh0c
miltinhoc
8 months
CAPE Sandbox exposes an HTTP endpoint ( http://localhost:8000/browser_extension) used to log HTTP trafifc. You can detect CAPE by sending a dummy HTTP request to this endpoint and checking the response. You can then craft fake HTTP data and it’ll show up on VirusTotal.
1
6
55
@0x6D6172636F
смех
8 months
SE resulting in substantial crypto theft. Initial payload was a very large (700mb+) .msi. Two new samples named, some oleview.exe sideloading fun as well. Little shoutout to @C5pider 's HavocFramework project. https://t.co/hYZwfwmEVk
Tweet card summary image
kroll.com
During the investigation of a large-scale crypto currency theft, Kroll researchers discovered two new pieces of malware. These pieces of malware ultimately lead to the deployment of Havoc C2’s agent...
1
3
16
@CryptDeriveKey
estrellas
8 months
0
3
11
@_mattata
remy🐀
8 months
1
5
27
@HSVSphere
HSVSphere
9 months
STOP DOING LISP
44
32
649
@nicolodev
Nicolò Altamura
11 months
Disassembly algorithms are often a trade-off. My new blog post analyzes linear sweep and recursive traversal, exploring their strengths and weaknesses in a self-built disassemblers. https://t.co/sUbGyyKFOY
nicolo.dev
Building your own set of analysis tools is a great exercise for those who already have some basics and allows you to later move on to implement more targeted analyses in reverse engineering. Even...
3
51
230
@_nnaci
naci
11 months
I discuss the creation of Mergen, VM based obfuscations, and explore how compiler techniques are used for reverse engineering and deobfuscation. https://t.co/gAdlXoiX2J
nac-l.github.io
Table Of Contents
2
69
276
@moonlock_lab
Moonlock Lab
11 months
1/8: Did someone just add #CTF code to the #AMOS stealer?.. After analysis of a yet undetected ‘lobsterstealer’ sample discovered by @suyog41, we found a few noticeable things that differentiate it from regular filegrabbers we’ve seen before.
3
13
45
@mya_project
Mya Project
11 months
We are making a new language to write specifications of an ISA called Mya. Based on the Mya specification, we will automatically generate an assembler and disassembler for the ISA. See:
github.com
[WIP] Mya language specification. Contribute to mya-project/mya-spec development by creating an account on GitHub.
0
3
7