jstrosch Profile Banner
Josh Stroschein | The Cyber Yeti Profile
Josh Stroschein | The Cyber Yeti

@jstrosch

Followers
11K
Following
8K
Media
1K
Statuses
5K

Reverse engineer at FLARE/@Google | @pluralsight author | 😱 1M+ views on YT | πŸŽ™οΈ Host of Behind the Binary podcast πŸ‘‡

Wherever you find me
Joined July 2009
Don't wanna be here? Send us removal request.
@jstrosch
Josh Stroschein | The Cyber Yeti
1 month
πŸ”’ Ever wonder how software stays secure? On Behind the Binary, Tim Blazytko, Chief Scientist at Emproof, explores code obfuscation, anti-reverse engineering, and modern defense strategies. Discover the challenges, trade-offs, and defender's mindset! 🎧 .
0
9
32
@jstrosch
Josh Stroschein | The Cyber Yeti
1 day
πŸ“£ Next week's live stream is with Evasive Malware author Kyle Cucci! Kyle and I will be tackling Go malware and demonstrate effective approaches for analyzing. Join us on YouTube July 10th at 1pm CDT πŸ‘‡ .
1
7
19
@jstrosch
Josh Stroschein | The Cyber Yeti
2 days
RT @LitMoose: Jesko is one of the best RE's I've ever worked with. This is worth the watch.
0
2
0
@jstrosch
Josh Stroschein | The Cyber Yeti
7 days
πŸ€—β™₯️.
@greglesnewich
Greg Lesnewich
7 days
Great episode! . It’s a fun throwback to when Lazarus meant something 😜. And a cool journey on methods for binary similarity to track an actor / developer.
0
0
2
@jstrosch
Josh Stroschein | The Cyber Yeti
7 days
RT @d4rksystem: Sharing my slides from BotConf 2025: "Elephant in the Sandbox: An Analysis of DBatLoader’s Unique Evasion Techniques". If y….
0
18
0
@jstrosch
Josh Stroschein | The Cyber Yeti
9 days
RT @OrangeCon_nl: Stef van Dop, co-founder of OrangeCon, joined Dr. Josh Stroschein - The Cyber Yeti (@jstrosch) for a live stream discussi….
0
7
0
@jstrosch
Josh Stroschein | The Cyber Yeti
9 days
πŸŽ™οΈ Another episode of Behind the Binary is here! Ever wonder who names the world's most notorious APTs? In this episode, we sit down with Greg Sinclair, a reverse engineer from the FLARE team at Google. Greg not only hunts down sophisticated malware but also shares the behind the.
0
1
22
@jstrosch
Josh Stroschein | The Cyber Yeti
10 days
πŸ”₯πŸ‘‡.
@d4rksystem
Kyle Cucci
10 days
Interested in learning how to build a lab VM for malware analysis and reversing? You can download a 40+ page chapter on this topic, taken from my book Evasive Malware. Get the PDF from my blog, here: πŸ€“. CC @nostarch.
0
1
9
@jstrosch
Josh Stroschein | The Cyber Yeti
10 days
πŸ€” Miss the stream with Jesko? You can get caught up here!. . In this stream, Jesko shows how to use Binary Refinery to unravel a multi-stage downloader that leads to AgentTesla.
0
8
32
@jstrosch
Josh Stroschein | The Cyber Yeti
12 days
RT @x64dbg: It is now super easy to build x64dbg and start contributing, give it a try!πŸ€“
0
49
0
@jstrosch
Josh Stroschein | The Cyber Yeti
12 days
😈 There is more to the Malware Mondays series, such as utilizing online sandboxes, the basics of the PE file format, and file identification and hashing. You can find links to challenge files, videos and more at πŸ‘‡ .
0
1
10
@jstrosch
Josh Stroschein | The Cyber Yeti
13 days
😈 Malware Mondays ep 06 returns to network traffic analysis and shows you how to use Suricata in offline mode to generate alerts from malicious PCAP files. πŸ‘‰ . Find more from the series:
0
4
9
@jstrosch
Josh Stroschein | The Cyber Yeti
14 days
RT @struppigel: binary refinery fans, @huettenhain is live with @jstrosch: .
0
14
0
@jstrosch
Josh Stroschein | The Cyber Yeti
14 days
😈 Malware Mondays ep 05 shows you how to identify malware capabilities using the open-source tool CAPA. πŸ‘‰ . Find more from the series:
0
2
9
@jstrosch
Josh Stroschein | The Cyber Yeti
15 days
RT @GuidedHacking: Game hackers have defined the bleeding edge of low-level security innovation for the past 10 years. Infosec will never….
0
18
0
@jstrosch
Josh Stroschein | The Cyber Yeti
15 days
😈 Malware Mondays ep 04 introduces the importance of strings and extracting/recovering them with FLOSS. πŸ‘‰ . Find more from the series:
0
1
12
@jstrosch
Josh Stroschein | The Cyber Yeti
15 days
πŸ₯· Struggling with shellcode? Check out SCLauncher, it wraps shellcode in a PE file for easy reversing & debugging! See it speed up analysis in this video. . Find it on GitHub:
0
1
6
@jstrosch
Josh Stroschein | The Cyber Yeti
15 days
Unraveling a Multi-Stage Downloader with Binary Refinery - Guest Jesko Huttenhain
0
4
16
@jstrosch
Josh Stroschein | The Cyber Yeti
15 days
RT @jstrosch: πŸš€ Live stream starting soon! Join us as Jesko HΓΌttenhain shows how to dissect malware using his tool, Binary Refinery!. πŸ‘‰ h….
0
3
0
@jstrosch
Josh Stroschein | The Cyber Yeti
15 days
πŸš€ Live stream starting soon! Join us as Jesko HΓΌttenhain shows how to dissect malware using his tool, Binary Refinery!. πŸ‘‰
0
3
6
@jstrosch
Josh Stroschein | The Cyber Yeti
16 days
#malcat is an amazing tool - if you want to see it in action, you can watch the author show off it's many features in this live stream:.
@malcat4ever
Malcat
17 days
If you need to identify #malware quickly, give #malcat a try: its Kesakode code identification is fast and can even work offline! .More info:
0
7
65