coolestcatiknow Profile Banner
Cat Profile
Cat

@coolestcatiknow

Followers
2K
Following
4K
Media
208
Statuses
1K

Infosec-er, nerd, artist and vet. Work @mitreattack as a leader and contributor. πŸ’–πŸŽπŸ§πŸ‘©β€πŸ’». Opinions are like πŸ°πŸ•³, they change the more you know.

Denver, CO
Joined June 2017
Don't wanna be here? Send us removal request.
@coolestcatiknow
Cat
3 years
I 😻 speaking at #OBTS! Thank you @objective_see and @MITREattack for making this presentation happen! ATT&CKing Pandas: Drawing out ATT&CK Techniques in the Wild - slides... https://t.co/Y9D4LfN0uv πŸ™Thank you to @MiscreantsHQ for the amazing artwork! 🎨 comics in 🧡
8
13
42
@struppigel
Karsten Hahn
5 days
For anyone who wants to understand certificates better and how to spot abuse, this is a great read (by @SquiblydooBlog ) https://t.co/55pMCg266s
2
27
96
@malwrhunterteam
MalwareHunterTeam
4 days
Some strange Linux sample named "agent" seen from France: a18c29c72d1808477727ec2a611cee0f22ecd435457265bcf10823e0980c3636 microsoftonline[.]download "ShrekWare2024" "Robust TCP-based Reconnaissance C2 Agent Started" πŸ€” πŸ€·β€β™‚οΈ
10
7
30
@sabziz
Seif Abdelaziz
12 days
I reverse engineered iMessage so it sends you a notification whenever someone starts typing... Here's how it works. 1. The app injects its own code into the iMessage app using DYLD_INSERT_LIBRARIES to hook into its internal methods 2. Dynamically loads Apple's private
71
34
2K
@TuringAlex
Alex. Turing
12 days
🚨The IP 23.27.140[.]49 metioned in the report also hosts an #ELF sample 298ef0317beb4d6c3e1f1dbe1ee6f244 This file is actually linux variant of the #BADCALL #Backdoor, which is attributed to the #Lazarus #APT group. πŸ“Έ#IOC #C2 is 23.27.177[.]183.πŸ“Έ Happy hunting 🍷 @Xlab_qax
@blackorbird
blackorbird
16 days
#kimsuky Malware HttpTroy #lazarus BLINDINGCAN remote access tool upgraded version https://t.co/503xrx8DDs
2
13
57
@jbradley89
Jaron Bradley
14 days
Incase you missed it, I dropped my new book β€œThreat Hunting macOS” last month. You can purchase it from my website if you’re interested! https://t.co/wOlMwj3NkU
Tweet card summary image
themittenmac.com
https://youtu.be/OnIAmOz0TjoChapter 1https://youtu.be/9bQCWbe2kDwChapter 2Now Available in the U.S.Welcome to my latest book.Β Threat Hunting macOSβ€”a book that share
0
5
30
@virusbtn
Virus Bulletin
16 days
Arctic Wolf Labs reports that the China-linked threat actor UNC6384 targeted European diplomatic entities in Hungary and Belgium during September and October 2025, exploiting ZDI-CAN-25373 and deploying PlugX RAT malware. https://t.co/nMkh0jeqyc
0
38
73
@objective_see
Objective-See Foundation
21 days
Many asked Stuart (@stuartjash), how he made his slides so πŸ”₯for his recent #OBTS v8 talk. He was kind enough to make an explainer video, that we've added to our YouTube channel: Watch: "WeTalks - Keynote tutorial (Part 1): Keynope to Keydope"
1
8
45
@L0Psec
L0Psec
22 days
Alright here's another interesting one. More infostealer stuff but worth a look. There's a couple parts to this so I'll attempt to summarize. Thanks @malwrhunterteam for sharing :) Starting with the initial mach-O, (readable strings?!?!) Ugly plist for persistence. 🧡
1
7
34
@virusbtn
Virus Bulletin
22 days
Palo Alto's Unit 42 team investigate the Jingle Thief campaign operated by financially motivated Morocco-based attackers. The attackers use phishing & smishing to steal credentials, to compromise organizations that issue gift cards. https://t.co/Fixf1j0OOs
0
20
45
@virusbtn
Virus Bulletin
30 days
A FortiGuard article examines methodologies employed to identify strategic connections between Winos 4.0 attack campaigns across Asia, revealing how seemingly unrelated attacks are linked through shared infrastructure, code patterns & operational tactics https://t.co/wuGoONfyhl
0
23
84
@virusbtn
Virus Bulletin
1 month
Elastic Security Labs publishes nightMARE, a Python library (v0.16) for malware analysis and for building configuration extractors. https://t.co/Cdofl8Lazn
0
43
145
@unpacker
Seongsu Park
1 month
Finally, my DEF CON talk is now available on YouTube. In this presentation, I explore how DPRK threat actors have evolved, expanding, collaborating, and restructuring their internal operations. The session dives deep into how these organizational shifts, combined with technical
5
76
296
@orange_8361
Orange Tsai 🍊
1 month
Say hi to them β€” check out our latest research!
@d3vc0r3
DEVCORE
1 month
@hexacon_fr 2025 is here! This week (Oct 10–11), our researchers Xiaobye (@xiaobye_tw) and Pumpkin (@u1f383) hit the Paris stage with vulnerability research on MediaTek Wi-Fi and Linux io_uring. Big debut for our young talents at Hexacon! πŸ”₯
0
8
106
@L0Psec
L0Psec
1 month
Looks like another domain dropping Amos/odyssey infostealer: nadrty[.]com. This one was seen leveraging the URL directory path of /Homebrew/install/HEAD/ as a homebrew lookalike @500mk500
2
5
29
@BallisKit
BallisKit
2 months
MacOS red-team made practical β€” Objective-C implant for DarwinOps! Private Mythic C2 implant: lightweight (in-memory shellcode), post-exploitation, EDR & MDM evasion, integrates with DarwinOps + GateKeeper bypass. Contact us for more details! #RedTeam #macOS
2
27
150
@virusbtn
Virus Bulletin
2 months
DomainTools researchers look inside Salt Typhoon, a Chinese state-sponsored cyber threat group aligned with the Ministry of State Security (MSS), specializing in long-term espionage operations targeting global telecommunications infrastructure. https://t.co/tNE0zllDRJ
0
12
24
@virusbtn
Virus Bulletin
2 months
Check Point Research is tracking a long-running campaign by the Iranian threat actor Nimbus Manticore. The ongoing campaign targets defence manufacturing, telecommunications, and aviation sectors in Europe. https://t.co/7dSgIJCPic
0
24
51
@RussianPanda9xx
RussianPanda 🐼 πŸ‡ΊπŸ‡¦
2 months
Had an incredible time working on this case! πŸ” Proud to share my first contribution to @TheDFIRReport, I learned so much from investigating this case and can't wait to contribute more ☺️🐼
@TheDFIRReport
The DFIR Report
2 months
🌟New report out today!🌟 From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion Analysis/reporting completed by @RussianPanda, Christos Fotopoulos, Salem Salem, reviewed by @svch0st. Audio: Available on Spotify, Apple, YouTube and more! Report:⬇️
11
21
170
@SpecterOps
SpecterOps
2 months
Lateral movement getting blocked by traditional methods? @werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code.
Tweet card summary image
specterops.io
DCOM lateral movement BOF using Windows Installer (MSI) Custom Action Server - install ODBC drivers to load and execute DLLs
1
116
284