bohansec Profile Banner
Bohan Zhang Profile
Bohan Zhang

@bohansec

Followers
2K
Following
12K
Media
115
Statuses
4K

Threat Intelligence Analyst @esthreat ๐Ÿš€๐Ÿš€| Blue Teamer

Joined August 2014
Don't wanna be here? Send us removal request.
@bohansec
Bohan Zhang
5 years
Today marks my first day to work as a SOC analyst. Perhaps one thing I have learned over the years is to be persistent, never stop grinding, and chasing down your dream. Here is my timeline for me to achieve my dream.
12
12
163
@SquiblydooBlog
Squiblydoo
3 days
I love reporting the same malware, day after day. Week after week. This is why I built the Cert Graveyard. I can look back and see the other 30 times I've reported the same exact malware. It also helps build detections. Easy to find and compare samples.
@malwrhunterteam
MalwareHunterTeam
3 days
"Taiyuan Chenyun Trading Co., Ltd." (Certum given cert) signed "Screenshot2025122068698m.pif" sample: 14d374ea0604f70e6f39306efd948e7962fdd21cdb3e187ba461312027ebd3f5 ๐Ÿคทโ€โ™‚๏ธ
0
7
21
@reactjs
React
11 days
Researchers have found two new vulnerabilities in React Server Components while attempting to exploit the patches last week. These are new issues, separate from the critical CVE last week. The patch for React2Shell remains effective for the Remote Code Execution exploit.
383
1K
6K
@RussianPanda9xx
RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ
12 days
Ransomware groups stopped fighting your EDRโ€ฆ they are just logging into your hypervisor ๐Ÿ’€
@HuntressLabs
Huntress
12 days
A single hypervisor breach can put hundreds of virtual machines at risk. Weโ€™ve seen Akira and others shift to ESXi/Hyper-V for mass impact. โœ… They use legit tools (like openssl) โœ… Bypass EDR โœ… Encrypt VMDKs directly ๐Ÿ“ƒ @RussianPanda9xx @Purp1eW0lf https://t.co/nWxBC2Tb65
4
29
172
@YungBinary
YungBinary
14 days
TRU is tracking active exploitation of #React2Shell and released an advisory with observables/indicators. Observed activity includes system reconnaissance and attempts to exfiltrate AWS credentials. https://t.co/zpcQfKNiKE
1
2
47
@AminovDanielle
Danielle Aminov
17 days
With all the talk about the Next.js PoC, many people missed that the React2Shell vulnerability (CVE-2025-55182) affects the underlying RSC implementation itself. This means other popular frameworks that rely on RSC are also vulnerable. We are still analyzing the impact and ease
6
57
369
@struppigel
Karsten Hahn
17 days
Baoloader/TamperedChef paper by @SerkanSirmaci https://t.co/7fiO4VB7Vy
0
17
60
@cyb3rops
Florian Roth โšก๏ธ
17 days
This pretty much sums up the situation: an in-memory (!) JavaScript-based (!) webshell gets implanted into a vulnerable React server with a single(!) POST request and leaves zero(!) trace in logs or on disk. Someone used that POC, successfully injected the shell and still
@cyb3rops
Florian Roth โšก๏ธ
17 days
Itโ€™s wild how little sticks around when someone hits a server with the #React RCE payload. All the interesting parts of the POST request live for a moment in memory, get decoded, executed (or rejected), and vanish. Nothing hits a log, nothing lands on disk. You can scan process
13
128
987
@RussianPanda9xx
RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ
18 days
Announcing the rebrand of TRACLabs โ†’ LummaLabs. This is where I'll be publishing my personal research. And as promised, at 200 followers, new blog is live. Took more than 24 hours but I have a job, ok, leave me alone ๐Ÿ˜ญ Weyhro C2: because ransomware wasn't paying the bills
Tweet card summary image
lumma-labs.com
Acknowledgment: Thank you @whoamix302 for sharing the sample!
7
27
136
@reactjs
React
19 days
There is critical vulnerability in React Server Components disclosed as CVE-2025-55182 that impacts React 19 and frameworks that use it. A fix has been published in React versions 19.0.1, 19.1.2, and 19.2.1. We recommend upgrading immediately. https://t.co/kue7kd0XEX
Tweet card summary image
react.dev
The library for web and native user interfaces
153
1K
4K
@Huntio
Hunt.io
21 days
๐Ÿšฉ 7-Zip RCE Vulnerability Exploited in the Wild https://t.co/xww051lZKn Security researchers are warning that a remote-code-execution flaw (CVE-2025-11001) in 7-Zip is now being actively exploited. The bug stems from incorrect processing of symbolic links inside ZIP
Tweet card summary image
cybersecuritynews.com
Hackers have begun actively exploiting a critical remote code execution (RCE) vulnerability in the popular file archiver 7-Zip, putting millions of users at risk of malware infection and system...
5
87
265
@g0njxa
Who said what?
21 days
Featuring one of the most cool interviews with a MacOS infostealer developer, because โ€œmacOS is the safest system and has no viruses.โ€ Collaboration with @osint_barbie ๐ŸŽ๐Ÿคฉ No more spoilers today, read now a interview with Phexia: https://t.co/3GFnN3n4Jg
Tweet card summary image
g0njxa.medium.com
To completely understand whatโ€™s going on in a market that has been growing in the last years I found mandatory to know which players areโ€ฆ
3
18
80
@RussianPanda9xx
RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ
21 days
Everyone talks about ransomware. Almost nobody talks TO ransomware operators, so I did the job for you. [turn the subtitles on] https://t.co/O8I4pgoEkx
22
48
269
@vinopaljiri
Jiล™รญ Vinopal
22 days
WTF, wow, @washi_dev and @elektrokilldev are cooking ๐Ÿ’™๐Ÿ’™๐Ÿ’™๐Ÿ™๐Ÿ™Œ Lot of improvements in #dnSpyEx #dnSpy. The newly added feature showing searchable string references in module is insane good and cool ๐Ÿ‘๐Ÿ’ช Its soooo cooool ๐Ÿ˜ #dotnet #reversing https://t.co/cr3O3f9IZc
5
25
123
@struppigel
Karsten Hahn
23 days
๐Ÿฆ”๐Ÿ“น New Video: Modifying @vinopaljiri's string decrypter for a ConfuserEx2 variant โžก๏ธ Defeating antis with Harmony hooks โžก๏ธ AsmResolver โžก๏ธ .NET string deobfuscation #MalwareAnalysisForHedgehogs https://t.co/G1mOunwcEq
2
36
98
@RussianPanda9xx
RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ
23 days
Spoiler alert! New video is coming soon :3 cc @EdwardCrowderX @bohansec
4
8
61
@Kostastsale
Kostas
25 days
If youโ€™re trying to use Wazuh for threat hunting or incident response, stop wasting your time. Wazuh is fine for compliance and system visibility, but thatโ€™s where it ends. If you want to actually see whatโ€™s happening on an endpoint and run proper investigations to play around
8
21
243
@abuse_ch
abuse.ch
25 days
Weโ€™ve identified an interesting malware family ๐Ÿ”, which weโ€™ve named #GrokPy due to its use of a Grok LLM model ๐Ÿค– to solve and subsequently bypass CAPTCHAs ๐Ÿ”ฅ The malware gets dropped by #Amadey and: ๐Ÿช collects information about the infected device, such as screen
4
43
133
@FalconFeedsio
FalconFeeds.io
1 month
Scattered Spider / SLSH just launched a new Telegram channel โ€” and the activity shows a clear escalation in both tone and targeting. Early observations from the new channel: โ€ขTheyโ€™re bragging about 300+ victims individually, claiming higher earnings than Qilin & Cl0p combined.
12
42
238
@Kostastsale
Kostas
1 month
๐Ÿš€ ๐—ง๐—ต๐—ฒ ๐—˜๐——๐—ฅ ๐—–๐—ผ๐—บ๐—ฝ๐—ฎ๐—ฟ๐—ถ๐˜€๐—ผ๐—ป ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ถ๐˜€ ๐—ผ๐—ณ๐—ณ๐—ถ๐—ฐ๐—ถ๐—ฎ๐—น๐—น๐˜† ๐—น๐—ถ๐˜ƒ๐—ฒ! This is the evolution of the EDR Telemetry Project, expanding everything people valued there into a full, feature-level comparison across multiple EDR products. What it delivers: โ€ข
edr-comparison.com
Make informed security decisions with expert EDR comparisons. Compare endpoint detection and response solutions with detailed feature analysis and side-by-side comparisons.
15
72
345
@struppigel
Karsten Hahn
1 month
Rhadamanthys loader deobfuscation https://t.co/rDvK0uqgiV
1
30
79