RustyNoob619 Profile Banner
Yashraj Solanki Profile
Yashraj Solanki

@RustyNoob619

Followers
1K
Following
2K
Media
222
Statuses
650

Cyber Threat Intelligence Analyst @bridewellsec (All tweets are my views) C2 Hunting | Malware Noob | ICS Addict

England
Joined March 2023
Don't wanna be here? Send us removal request.
@RustyNoob619
Yashraj Solanki
11 months
As far as pivoting is concerned in CTI, you can pretty much do it all between @virustotal, @censysio & @urlscanio 🐧. I have taken all Artifact types and their features from the Awesome Pivot Atlas maintained by @AmitaiCo & mapped it against sources & where to find them. Links ⬇️
Tweet media one
22
79
360
@RustyNoob619
Yashraj Solanki
6 days
@DEATHCon2025 I will also be in Edinburgh on 8th & 9th of Nov if anyone wants to link up :). Also, @knappresearchlb will be doing a CTF style workshop on Adversary Infrastructure Hunting (rumor has it that winner gets a sick custom coin) πŸ˜‰. Tickets are now live at
0
1
3
@RustyNoob619
Yashraj Solanki
6 days
Super excited to say that I will be doing my first ever solo workshop at @DEATHCon2025. It will be on writing YARA for malware attribution (I know this is a scary word) 🐧. There are plenty of other cool workshops on all things Detection Engineering & Threat Hunting. Mo Deets ⬇️
Tweet media one
@DEATHCon2025
DEATHCon
22 days
Get excited to learn from @RustyNoob619 in a hands-on workshop at #DEATHCon2025 called "Intel-Driven YARA for Attribution" Learn how to go from intel reports to great YARA rules for #detectionengineering and finding more samples. Check out the workshops:
2
3
19
@RustyNoob619
Yashraj Solanki
10 days
#RandomThoughts .In my opinion, one of the biggest challenges in the modern realm of CTI is retaining conventional intelligence while bolstering workflows using automation, GenAI and other machine learning components which are likely to introduce unknown biases in the process 🐧.
1
0
4
@RustyNoob619
Yashraj Solanki
17 days
Apologies for the Mandatory Details Entry, call it my bias if you may but it is worth it πŸ™ƒ.
0
0
3
@RustyNoob619
Yashraj Solanki
17 days
Our team has just released the 2025 CTI Report. The key focus has been on tracking adversary infrastructure and is packed with our threat research insights alongside an in-depth view into the changing information stealers & ransomware ecosystems 🐧. Link:
1
24
99
@RustyNoob619
Yashraj Solanki
29 days
RT @ShanHolo: Saturday morning and I'm bit bored so why don't I look for #Phishing #CryptoScam websites for the #lol 🀣πŸ€ͺusing free tools?….
0
5
0
@RustyNoob619
Yashraj Solanki
1 month
Back to all things Cyber after a month of break, feeling refreshed and pumped up 🐧.
0
0
3
@RustyNoob619
Yashraj Solanki
1 month
RT @DEATHCon2025: We've received so many excellent workshop CFP responses for DEATHCon 2025, and we'll be sending acceptance messages by to….
0
4
0
@RustyNoob619
Yashraj Solanki
2 months
RT @RexorVc0: #APT #APT37 #RicochetChollima #ScarCruft #threat #malware #RokRAT. πŸ“πŸ‡°πŸ‡΅.πŸ’₯πŸ‡°πŸ‡·πŸŒ. ⛓️#Phishing > Dropbox link > ZIP + #LNK > Drop i….
0
27
0
@RustyNoob619
Yashraj Solanki
2 months
For the malware loving homosapiens, this platform is for you. You simply got to admire the efforts that the community is putting in to make sure awesome resources accessible to all, nicely done @MalGamy12 🐧.
@MalGamy12
Gameel Ali 🀘
2 months
We’re excited to announce the launch of , a platform built by analysts, for analysts and it’s completely free. You can join and enjoin with our frist challenge about RokRat Loader.
Tweet media one
1
0
7
@RustyNoob619
Yashraj Solanki
3 months
@greglesnewich All of my rules from 2024 and 2025 challenges can be found below. Link: Exciting times ahead, so stay frosty 🐧.
0
1
8
@RustyNoob619
Yashraj Solanki
3 months
#100DaysofYARA . ===> Final Post <===. I would like to thank @greglesnewich for all the motivation. This challenge has massively improved my YARA 🐧. If anyone knows any Closed YARA Sharing Groups, I would love to be part of it (preferably focused on APTs) . Link to my rules ⬇️.
2
2
24
@RustyNoob619
Yashraj Solanki
3 months
#100DaysofYARA Days 100:. Last but not least, this YARA detects the Linux Auto-Color backdoor 🐧.
Tweet media one
4
1
16
@RustyNoob619
Yashraj Solanki
3 months
#100DaysofYARA Days 99:. More on Apple Seed, this time focused on the EXE version based on the observed strings 🐧.
Tweet media one
0
0
2
@RustyNoob619
Yashraj Solanki
3 months
#100DaysofYARA Days 98:. Detects Apple Seed backdoor DLL used by DPRK APT Kimsuky 🐧.
Tweet media one
0
5
20
@RustyNoob619
Yashraj Solanki
3 months
#100DaysofYARA . As we are slowing coming towards the end of the challenge, just wanted to thank @vxunderground, @abuse_ch & countless other awesome humans who continue to share malware. This is what has allowed my malware corpus to grow over time and with that the YARA 🐧
Tweet media one
0
1
13
@RustyNoob619
Yashraj Solanki
3 months
#100DaysofYARA Days 97:. More LNK action, this one uses the LNK module in YARA to detect those files attempting to download or contact URLs 🐧.
Tweet media one
0
0
6
@RustyNoob619
Yashraj Solanki
3 months
#100DaysofYARA Days 96:. More on Medusa, this one is based on the ransomware note strings and potential ASCII art 🐧.
Tweet media one
0
1
13
@RustyNoob619
Yashraj Solanki
3 months
#100DaysofYARA Days 95:. Detects Medusa Ransomware based on the the PDB artifact 🐧.
Tweet media one
0
1
18
@RustyNoob619
Yashraj Solanki
3 months
#100DaysofYARA Days 94:. This one detects a Windows Reverse Shell impersonating Putty Client with malware config properties of Meterpreter.
Tweet media one
1
0
5