
Yashraj Solanki
@RustyNoob619
Followers
1K
Following
2K
Media
222
Statuses
650
Cyber Threat Intelligence Analyst @bridewellsec (All tweets are my views) C2 Hunting | Malware Noob | ICS Addict
England
Joined March 2023
As far as pivoting is concerned in CTI, you can pretty much do it all between @virustotal, @censysio & @urlscanio π§. I have taken all Artifact types and their features from the Awesome Pivot Atlas maintained by @AmitaiCo & mapped it against sources & where to find them. Links β¬οΈ
22
79
360
@DEATHCon2025 I will also be in Edinburgh on 8th & 9th of Nov if anyone wants to link up :). Also, @knappresearchlb will be doing a CTF style workshop on Adversary Infrastructure Hunting (rumor has it that winner gets a sick custom coin) π. Tickets are now live at
0
1
3
Super excited to say that I will be doing my first ever solo workshop at @DEATHCon2025. It will be on writing YARA for malware attribution (I know this is a scary word) π§. There are plenty of other cool workshops on all things Detection Engineering & Threat Hunting. Mo Deets β¬οΈ
Get excited to learn from @RustyNoob619 in a hands-on workshop at #DEATHCon2025 called "Intel-Driven YARA for Attribution" Learn how to go from intel reports to great YARA rules for #detectionengineering and finding more samples. Check out the workshops:
2
3
19
#RandomThoughts .In my opinion, one of the biggest challenges in the modern realm of CTI is retaining conventional intelligence while bolstering workflows using automation, GenAI and other machine learning components which are likely to introduce unknown biases in the process π§.
1
0
4
RT @ShanHolo: Saturday morning and I'm bit bored so why don't I look for #Phishing #CryptoScam websites for the #lol π€£π€ͺusing free tools?β¦.
0
5
0
RT @DEATHCon2025: We've received so many excellent workshop CFP responses for DEATHCon 2025, and we'll be sending acceptance messages by toβ¦.
0
4
0
RT @RexorVc0: #APT #APT37 #RicochetChollima #ScarCruft #threat #malware #RokRAT. ππ°π΅.π₯π°π·π. βοΈ#Phishing > Dropbox link > ZIP + #LNK > Drop iβ¦.
0
27
0
For the malware loving homosapiens, this platform is for you. You simply got to admire the efforts that the community is putting in to make sure awesome resources accessible to all, nicely done @MalGamy12 π§.
Weβre excited to announce the launch of , a platform built by analysts, for analysts and itβs completely free. You can join and enjoin with our frist challenge about RokRat Loader.
1
0
7
@greglesnewich All of my rules from 2024 and 2025 challenges can be found below. Link: Exciting times ahead, so stay frosty π§.
0
1
8
#100DaysofYARA . ===> Final Post <===. I would like to thank @greglesnewich for all the motivation. This challenge has massively improved my YARA π§. If anyone knows any Closed YARA Sharing Groups, I would love to be part of it (preferably focused on APTs) . Link to my rules β¬οΈ.
2
2
24
#100DaysofYARA Days 100:. Last but not least, this YARA detects the Linux Auto-Color backdoor π§.
4
1
16
#100DaysofYARA Days 99:. More on Apple Seed, this time focused on the EXE version based on the observed strings π§.
0
0
2
#100DaysofYARA . As we are slowing coming towards the end of the challenge, just wanted to thank @vxunderground, @abuse_ch & countless other awesome humans who continue to share malware. This is what has allowed my malware corpus to grow over time and with that the YARA π§
0
1
13
#100DaysofYARA Days 97:. More LNK action, this one uses the LNK module in YARA to detect those files attempting to download or contact URLs π§.
0
0
6
#100DaysofYARA Days 96:. More on Medusa, this one is based on the ransomware note strings and potential ASCII art π§.
0
1
13
#100DaysofYARA Days 94:. This one detects a Windows Reverse Shell impersonating Putty Client with malware config properties of Meterpreter.
1
0
5