MrNox_ Profile Banner
Nox Profile
Nox

@MrNox_

Followers
2K
Following
4K
Media
95
Statuses
11K

Casual CTF player at @id10t_ctf. Independent Vulnerability REsearcher, formerly @Immunityinc and @CoreSecurity.

Callao, Peru
Joined December 2010
Don't wanna be here? Send us removal request.
@MrNox_
Nox
1 year
I wrote a short blogpost about how to dump a firmware via UART and boot setup commands :D https://t.co/Kf0EbIlM2S También hay la versión en español :D
0
5
17
Just released🎉 Remote GUI debugger for Reverse Engineering. https://t.co/rqRo28k253
Tweet card summary image
github.com
Next-Generation Remote Analysis Suite for Reverse Engineering. - DoranekoSystems/DynaDbg
@DoranekoSystems
7 days
I will be releasing the Android ARM64 version soon!
5
60
481
@mytechnotalent
Kevin Thomas
4 days
Lesson 37: x86 Course (Part 37 - ASM Program 6 [CMOV Instructions]) - This tutorial will address how to hack our sixth real Assembly Program with CMOV instructions. #ReverseEngineering
Tweet card summary image
github.com
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures. - mytechnotalent/Reverse-Engineering
0
3
12
@alexjplaskett
Alex Plaskett
5 days
Four Bytes, One Lie: A SMAP-Free Confidence Trick on Kernel Pointers by Hyeonjin https://t.co/xybXA1svID
0
14
65
@mytechnotalent
Kevin Thomas
5 days
Lesson 36: x86 Course (Part 36 - ASM Hacking 5 [Indirect Addressing With Registers]) - This tutorial will address how to hack our fifth real Assembly Program by indirect addressing with registers. #ReverseEngineering
Tweet card summary image
github.com
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures. - mytechnotalent/Reverse-Engineering
0
4
20
@rushilshah_x
rushilshah
7 days
This UI still looks better than half the apps today.
528
1K
12K
@Officialwhyte22
Winston Ighodaro
4 days
I found malware that embedded itself into an audio driver. It silently recorded from the system microphone and uploaded the compressed .wav files every 20 minutes. Using memory forensics and strings, I discovered a hidden process writing to a staged audio cache in %Temp%.
356
1K
13K
@hacker_ralf
HackerRalf
6 days
AdaptixC2 v0.11 is out! Feature updates, fixes, new BOFs, and 2 new community-contributed agents! Releass Notes: https://t.co/RqVxoYUFGy
1
49
253
@struppigel
Karsten Hahn
4 days
🦔📹 New Video: Modifying @vinopaljiri's string decrypter for a ConfuserEx2 variant ➡️ Defeating antis with Harmony hooks ➡️ AsmResolver ➡️ .NET string deobfuscation #MalwareAnalysisForHedgehogs https://t.co/G1mOunwcEq
2
36
99
@0xor0ne
0xor0ne
7 days
Exploiting an N-day vulnerability in Qualcomm Adreno GPUs microcode https://t.co/o4ezSGPk6w #infosec
3
47
293
@bohops
bohops
1 month
Last month, @d_tranman and I gave a talk @MCTTP_Con called "COM to the Darkside" focusing on COM/DCOM cross-session and fileless lateral movement tradecraft. Check out the slides here: https://t.co/1KNln1ldzF Recording should be released soon.
Tweet card summary image
github.com
Slides and resources from MCTTP 2025 Talk. Contribute to bohops/COM-to-the-Darkside development by creating an account on GitHub.
1
81
252
@0xor0ne
0xor0ne
15 days
Exploiting LPE vulnerabilities in NVIDIA Linux Open GPU Kernel Modules by Robin Bastide (@quarkslab) https://t.co/IARbGJf0rQ #infosec
1
25
132
@hackerfantastic
hacker.house
26 days
User Account Control (UAC) bypass technique exploits a DLL Search Order hijacking vulnerability in the Microsoft iSCSI Initiator Configuration Tool (iscsicpl.exe). Allows arbitrary command execution with elevated privileges without triggering UAC prompts. https://t.co/mMx7dkbtbN
3
42
155
@Ox4d5a
Nikhil
26 days
Announcing "MaleficentVM". Learn and practice your malware development skills in ctfish mode challenges in a lab VM. This VM contains 50 challenges designed to improve your user mode malware development techniques. #infosec #malware https://t.co/UB9bIlgdqQ
Tweet card summary image
github.com
This is practice VM for malware development. Contribute to winsecurity/MaleficentVM development by creating an account on GitHub.
8
120
542
@XploitBengineer
Ben
30 days
I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices https://t.co/9tya9c37Ez
xploitbengineer.github.io
Motivation A couple of years ago, I picked up a few of Samsung S23’s at Pwn2Own.
6
79
251
@ulexec
ulexec
29 days
🥓
0
5
17
@0xor0ne
0xor0ne
28 days
PAC, BTI, and relative vtables bypass by @bruce30262 (HITCON CTF 2025) https://t.co/LZDFojees7 #infosec #ctf
0
20
101
@OpenSecTraining
OpenSecurityTraining2
1 month
This year @binarly_io has also expanded their sponsorship to the creation of a new Firmware Security Learning Path! This captures current and future plans for classes involving security in the deep-dark of firmware! But Binarly is starting to give visibility into what's going on
2
17
86
@herrcore
herrcore
1 month
IDA Reverse Engineering Step-by-Step Into Reverse Engineering: EXE Patreon Unlocked ❤️
6
196
1K
@it4sec
Denis Laskov 🇮🇱
1 month
BLE chip leaks AES keys through RF signals: a successful remote side-channel attack. 🔵🦷၊၊||၊|👂🔑 More details on: LinkedIn: https://t.co/U5eQaM63BE Substack: https://t.co/H6SL7rYKf9
5
94
556
@5mukx
Smukx.E
1 month
EDR Analysis: Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection https://t.co/ZzjOqqeNhf
2
58
267