c3rb3ru5d3d53c Profile Banner
ςεяβεяμs - мαℓωαяε яεsεαяςнεя Profile
ςεяβεяμs - мαℓωαяε яεsεαяςнεя

@c3rb3ru5d3d53c

Followers
25K
Following
19K
Media
2K
Statuses
20K

💕 Malware Hunter Killer 💕 #binlex & #mwcfg Developer 📽️ YouTuber 👩‍💻 She/Her 💍@DravenSwiftbow Support my work 👇 ☕️ https://t.co/NoM1TXq00P

🇵🇱🇨🇦
Joined August 2015
Don't wanna be here? Send us removal request.
@vector35
Vector 35
24 days
Join us for another interview this Friday at 4pm ET with Tim Blazytko! As the instructor of Software Deobfuscation Techniques at RE//verse 2026, we'll be picking his brain about the role obfuscation and deobfuscation play a role in today's cybersecurity scene. What would you like
2
8
25
@c3rb3ru5d3d53c
ςεяβεяμs - мαℓωαяε яεsεαяςнεя
1 month
This is crazy
@rucam365
Ru Campbell
1 month
ICYMI: Microsoft Authenticator for iOS + Android will detect, prevent, then wipe Entra creds on rooted devices (MC1179154). • Phase 1 (warn mode) begins February '26 • followed by Phase 2 (block mode) • then Phase 3 (wipes Entra creds) • expected to be completed ~April '26
1
2
5
@herrcore
herrcore
2 months
Hi! I know some folks here are interested in reverse engineering Rust binaries (: Our friend @cxiao__ just launched Decoder Loop: Rust Reverse Engineering training! If you'd like to stay notified on upcoming trainings, sign up on their mailing list:
Tweet card summary image
decoderloop.com
Decoder Loop | Reverse Engineering Training
1
17
90
@The_Cyber_News
Cyber Security News
2 months
🚨 7-Zip Vulnerabilities Let Attackers Execute Arbitrary Code Remotely Read more: https://t.co/uuuoSpQzHm Two high-severity vulnerabilities have been discovered in the popular open-source file archiver, 7-Zip, which could allow remote attackers to execute arbitrary code.
19
351
1K
@premium
Premium
4 months
Why guess when you can know?
0
676
8K
@InvokeReversing
Invoke RE
3 months
We are excited to announce that our founder Joshua Reynolds and @cyb3rjerry have been accepted to speak @BSidesTO with their talk titled "When Prettier Gets Ugly: The Scavenger Supply Chain Campaign" more info here: https://t.co/4uzF2sy2vs
1
7
19
@hackyboiz
hackyboiz
3 months
[Research] LLVM based VMProtect Devirtualization: Part 1 (EN) https://t.co/H2M9CQtkTy Hello, this is banda. In this post, I summarize the process of analyzing and devirtualizing VMProtect’s virtualization obfuscation using LLVM-based techniques. I also experimented with
2
63
291
@jpcert_ac
Analysis Center
3 months
Rustで作成されたバイナリのリバースエンジニアリングに関するレポートを公開しました。 レポートはGitHubリポジトリにて公開されているため、そちらもご覧ください。^TK https://t.co/KtifXsQzqu https://t.co/VFffIHthR6
Tweet card summary image
github.com
Rustで作成されたバイナリのリバースエンジニアリング調査レポート. Contribute to JPCERTCC/rust-binary-analysis-research-ja development by creating an account on GitHub.
0
47
114
@struppigel
Karsten Hahn
3 months
This blog post about impostor certificates by @SquiblydooBlog is a gem and very relevant right now. Or: How threat actors impersonate companies to obtain authenticode certificates for signing their malware. And why revokation is important. https://t.co/KPfvn8BOzM
Tweet card summary image
squiblydoo.blog
It is common for malware to be signed with code signing certificates. How is this possible? Impostors receive the cert directly and sign malware. In this blog-post, we look at 100 certs used by Sol…
0
44
163
@hacker_ralf
HackerRalf
3 months
AdaptixC2 v0.8 is out! https://t.co/mL8AAS7w4c * AxScript: new events and functions * Added Targets Manager * Updated tunnels Full update details: https://t.co/XkVlgaXW6W
4
86
481
@HexRaysSA
Hex-Rays SA
3 months
🚦 Stop guessing and start GOing. The upcoming IDA 9.2 release brings cleaner Golang decompilation with tuple types. Read the full blog: https://t.co/z2Ju39kNdB
0
14
101
@suyog41
Yogesh Londhe
4 months
RDK Stealer Uploaded from 🇺🇦 Anti-ship Tactical Cruise Missile Weapon System CM-35.exe d52186818ff0ec7a14d9751e98b9760c #RDKStealer #Stealer #IOC
@suyog41
Yogesh Londhe
2 years
RDK Stealer Обязанности старшего техника на самолете ТУ-160_вч_85927_Д_Каплунов.exe Responsibilities of a senior technician on a TU-160 aircraft_vch_85927_D_Kaplunov.exe 0d61d50067eb93ae9ce049be387ae4e2 Telegram https://t[.]me/rusvolcorp #RDKStealer #Stealer #IOC
0
9
20
@ViriBack
Dee
4 months
#malware #castle loader C2 panel: 85.158.108[.]135:5050/login 64.52.80[.]44:9999/login re: https://t.co/cLe8wZkM27
0
5
28
@DailyDarkWeb
Dark Web Intelligence
4 months
#USA 🇺🇸 - A massive database containing 1.7B Discord messages and 33M user profiles has allegedly been made searchable by threat actors. https://t.co/v3AvaAf8Nm
16
101
828
@NEWSMAX
NEWSMAX
1 month
Trump says NEWSMAX is 'terrific!' Click below to find out why...
15
511
4K
@c3rb3ru5d3d53c
ςεяβεяμs - мαℓωαяε яεsεαяςнεя
4 months
Tried running an LSI 9300-8i HBA on an MSI gaming board for TrueNAS. Flashed IT firmware, toggled BAR relocation, 4G decoding, PCIe gens, even pci=realloc=off. Nothing worked → $200 paperweight. Switched to NVMe-to-SATA instead. Lesson: HBAs + consumer boards = 🎲 gamble.
1
0
2
@krakovia_evm
Krakovia
4 months
someone deployed a malware extension for @cursor_ai but seems he forgot to delete promotional messages and the clear-text payload lol extra loot: download booster script
9
41
255
@vector35
Vector 35
4 months
Check out our latest blog post on modeling complex control flow with function-level basic block analysis in Binary Ninja 5.1. From DSPs to Brain***k, this update makes it easier to develop plugins for tricky architectures. https://t.co/pJi2PBtfqa
0
9
49
@jstrosch
Josh Stroschein | The Cyber Yeti
4 months
🔥 Type support in x64dbg? Duncan Ogilvie joins the live stream next week to talk about the latest x64dbg features! Join us on YouTube - https://t.co/KYipxgUxBF And if you want to learn how x64dbg came about, check out this podcast episode: https://t.co/L4xBzdy6V4
Tweet card summary image
open.spotify.com
Behind the Binary by Google Cloud Security · Episode
0
3
13
@jstrosch
Josh Stroschein | The Cyber Yeti
4 months
Unpacking Binlex with Cerberus: Malware Hunting & Binary Analysis Live!
1
11
38
@jstrosch
Josh Stroschein | The Cyber Yeti
4 months
📣 As life slowly returns to normal after Black Hat and DEFCON, so too do live streams... Cerberus joins the live stream this Thursday to talk about malware detection using Binlex 👇 https://t.co/tjg7SVcEcV
0
12
34
@InvokeReversing
Invoke RE
4 months
For those who missed it, our founder Joshua Reynolds featured the Binja Lattice MCP server on Prompt||GTFO here: https://t.co/Bxya7QGOv5 where he highlighted reverse engineering malware with AI!
0
7
21