PhysicalDrive0 Profile Banner
PhysicalDrive0 Profile
PhysicalDrive0

@PhysicalDrive0

Followers
16K
Following
0
Media
423
Statuses
23K

Malware Hunter / I've already taken the red pill!

Down The Wrong Rabbit Hole
Joined November 2010
Don't wanna be here? Send us removal request.
@PhysicalDrive0
PhysicalDrive0
6 years
RT @antonivanovm: We found one more #zeroday exploit that was used in APT.
Tweet media one
0
195
0
@PhysicalDrive0
PhysicalDrive0
6 years
RT @commial: Now, Sibyl can be called from @GHIDRA_RE ( or use it headless for function address discovering (https:….
0
58
0
@PhysicalDrive0
PhysicalDrive0
6 years
RT @Dark_Puzzle: Circumventing Windows Defender ATP's user-mode APC Injection sensor from Kernel-mode : https://t.c….
0
93
0
@PhysicalDrive0
PhysicalDrive0
6 years
Operation #ShadowHammer Sample MD5 aa15eb28292321b586c27d8401703494.#Asus #Susafone.
0
5
10
@PhysicalDrive0
PhysicalDrive0
6 years
WINRAR EXPLOIT BUILDER.Select your malware file and upload it and your malicious RAR-file will be created.hxxp://lofi.stream cve-2018-20250
Tweet media one
1
46
84
@PhysicalDrive0
PhysicalDrive0
6 years
CVE-2019-5786 Chrome 72.0.3626.119 stable FileReader UaF exploit for Windows 7 x86.
Tweet card summary image
github.com
FileReader Exploit. Contribute to exodusintel/CVE-2019-5786 development by creating an account on GitHub.
0
2
7
@PhysicalDrive0
PhysicalDrive0
6 years
RT @360CoreSec: Microsoft fixed a Windows 0day (CVE-2019-0808) in Patch Tuesday. Our team constructed the POC and reproduced the vulnerabil….
0
180
0
@PhysicalDrive0
PhysicalDrive0
6 years
RT @antonivanovm: One more #zeroday exploit was used in APT attack.
Tweet media one
0
120
0
@PhysicalDrive0
PhysicalDrive0
6 years
#WinPot Sample MD5 821e593e80c598883433da88a5431e9d #ATM.
@Securelist
Securelist
6 years
Meet #ATMPot - the ATM malware designed to automate the dispensing of cash from a popular range of ATM machines. The designers even went to the trouble of making the interface look like that of a slot-machine. Learn more:
Tweet media one
2
12
13
@PhysicalDrive0
PhysicalDrive0
6 years
Tweet media one
0
6
5
@PhysicalDrive0
PhysicalDrive0
6 years
Tweet media one
1
0
0
@PhysicalDrive0
PhysicalDrive0
6 years
RT @VK_Intel: 2019-02-08: #ExileRAT Group:."CVE-2017-8759" altered toolkit "get_robin.py" server thread w/ local logging .{ SHELLCODE1 = 's….
0
22
0
@PhysicalDrive0
PhysicalDrive0
6 years
#KerrDown Sample SHA256 e56ffcf5df2afd6b151c24ddfe7cd450f9208f59b5731991b926af0dce24285a #APT32 #OceanLotus.
1
5
11
@PhysicalDrive0
PhysicalDrive0
6 years
#ExileRAT is still up n running.hxxp://27.126.188.212/2//
Tweet media one
0
2
17
@PhysicalDrive0
PhysicalDrive0
7 years
RT @insertScript: CVE-2018-16858 - My writeup about a RCE vulnerability via macro execution in Libreoffice:
0
143
0
@PhysicalDrive0
PhysicalDrive0
7 years
#Zebrocy MD5 c9e1b0628ac62e5cb01bf1fa30ac8317
@k_sec
Kurt Baumgartner
7 years
details and indicators of Zebrocy's overlap with BlackEnergy/GreyEnergy
0
2
5
@PhysicalDrive0
PhysicalDrive0
7 years
RT @AirbusSecLab: Version 1.1 of BinCAT, our static binary code analyzer for reversers, was just released, with long awaited AMD64 support….
0
149
0
@PhysicalDrive0
PhysicalDrive0
7 years
RT @360TIC: #CVE-2018-8453 deep analysis, from Use After Free to arbitrary memory read/write by 360 Threat Intelligence Center, a follow up….
0
79
0