ςεяβεяμs - мαℓωαяε яεsεαяςнεя
@c3rb3ru5d3d53c
Followers
25K
Following
19K
Media
2K
Statuses
20K
💕 Malware Hunter Killer 💕 #binlex & #mwcfg Developer 📽️ YouTuber 👩💻 She/Her 💍@DravenSwiftbow Support my work 👇 ☕️ https://t.co/NoM1TXq00P
🇵🇱🇨🇦
Joined August 2015
Join us for another interview this Friday at 4pm ET with Tim Blazytko! As the instructor of Software Deobfuscation Techniques at RE//verse 2026, we'll be picking his brain about the role obfuscation and deobfuscation play a role in today's cybersecurity scene. What would you like
2
8
25
Hi! I know some folks here are interested in reverse engineering Rust binaries (: Our friend @cxiao__ just launched Decoder Loop: Rust Reverse Engineering training! If you'd like to stay notified on upcoming trainings, sign up on their mailing list:
decoderloop.com
Decoder Loop | Reverse Engineering Training
1
17
90
🚨 7-Zip Vulnerabilities Let Attackers Execute Arbitrary Code Remotely Read more: https://t.co/uuuoSpQzHm Two high-severity vulnerabilities have been discovered in the popular open-source file archiver, 7-Zip, which could allow remote attackers to execute arbitrary code.
19
351
1K
We are excited to announce that our founder Joshua Reynolds and @cyb3rjerry have been accepted to speak @BSidesTO with their talk titled "When Prettier Gets Ugly: The Scavenger Supply Chain Campaign" more info here: https://t.co/4uzF2sy2vs
1
7
19
[Research] LLVM based VMProtect Devirtualization: Part 1 (EN) https://t.co/H2M9CQtkTy Hello, this is banda. In this post, I summarize the process of analyzing and devirtualizing VMProtect’s virtualization obfuscation using LLVM-based techniques. I also experimented with
2
63
291
Rustで作成されたバイナリのリバースエンジニアリングに関するレポートを公開しました。 レポートはGitHubリポジトリにて公開されているため、そちらもご覧ください。^TK https://t.co/KtifXsQzqu
https://t.co/VFffIHthR6
github.com
Rustで作成されたバイナリのリバースエンジニアリング調査レポート. Contribute to JPCERTCC/rust-binary-analysis-research-ja development by creating an account on GitHub.
0
47
114
This blog post about impostor certificates by @SquiblydooBlog is a gem and very relevant right now. Or: How threat actors impersonate companies to obtain authenticode certificates for signing their malware. And why revokation is important. https://t.co/KPfvn8BOzM
squiblydoo.blog
It is common for malware to be signed with code signing certificates. How is this possible? Impostors receive the cert directly and sign malware. In this blog-post, we look at 100 certs used by Sol…
0
44
163
AdaptixC2 v0.8 is out! https://t.co/mL8AAS7w4c * AxScript: new events and functions * Added Targets Manager * Updated tunnels Full update details: https://t.co/XkVlgaXW6W
4
86
481
🚦 Stop guessing and start GOing. The upcoming IDA 9.2 release brings cleaner Golang decompilation with tuple types. Read the full blog: https://t.co/z2Ju39kNdB
0
14
101
RDK Stealer Uploaded from 🇺🇦 Anti-ship Tactical Cruise Missile Weapon System CM-35.exe d52186818ff0ec7a14d9751e98b9760c #RDKStealer #Stealer #IOC
RDK Stealer Обязанности старшего техника на самолете ТУ-160_вч_85927_Д_Каплунов.exe Responsibilities of a senior technician on a TU-160 aircraft_vch_85927_D_Kaplunov.exe 0d61d50067eb93ae9ce049be387ae4e2 Telegram https://t[.]me/rusvolcorp
#RDKStealer #Stealer #IOC
0
9
20
#malware #castle loader C2 panel: 85.158.108[.]135:5050/login 64.52.80[.]44:9999/login re: https://t.co/cLe8wZkM27
0
5
28
#USA 🇺🇸 - A massive database containing 1.7B Discord messages and 33M user profiles has allegedly been made searchable by threat actors. https://t.co/v3AvaAf8Nm
16
101
828
Tried running an LSI 9300-8i HBA on an MSI gaming board for TrueNAS. Flashed IT firmware, toggled BAR relocation, 4G decoding, PCIe gens, even pci=realloc=off. Nothing worked → $200 paperweight. Switched to NVMe-to-SATA instead. Lesson: HBAs + consumer boards = 🎲 gamble.
1
0
2
someone deployed a malware extension for @cursor_ai but seems he forgot to delete promotional messages and the clear-text payload lol extra loot: download booster script
9
41
255
Check out our latest blog post on modeling complex control flow with function-level basic block analysis in Binary Ninja 5.1. From DSPs to Brain***k, this update makes it easier to develop plugins for tricky architectures. https://t.co/pJi2PBtfqa
0
9
49
🔥 Type support in x64dbg? Duncan Ogilvie joins the live stream next week to talk about the latest x64dbg features! Join us on YouTube - https://t.co/KYipxgUxBF And if you want to learn how x64dbg came about, check out this podcast episode: https://t.co/L4xBzdy6V4
open.spotify.com
Behind the Binary by Google Cloud Security · Episode
0
3
13
Unpacking Binlex with Cerberus: Malware Hunting & Binary Analysis Live!
1
11
38
📣 As life slowly returns to normal after Black Hat and DEFCON, so too do live streams... Cerberus joins the live stream this Thursday to talk about malware detection using Binlex 👇 https://t.co/tjg7SVcEcV
0
12
34
For those who missed it, our founder Joshua Reynolds featured the Binja Lattice MCP server on Prompt||GTFO here: https://t.co/Bxya7QGOv5 where he highlighted reverse engineering malware with AI!
0
7
21