keowu Profile Banner
João Vitor(Keowu) Profile
João Vitor(Keowu)

@keowu

Followers
388
Following
483
Media
3
Statuses
36

Reverse & EDR Dev | Jesus Follower | My RE friends discord server: discord dot gg/fWhvHXtzxy | https://t.co/cPfrnwC6jN | I just know that idk anything | 🇯🇵 🇺🇸 🇧🇷

Shizuoka-JP
Joined April 2022
Don't wanna be here? Send us removal request.
@keowu
João Vitor(Keowu)
1 year
My new article using HexRays IDA. to deal with obfuscated code. comercial like VmProtect and OpenSource like Alcatraz:.
keowu.re
Analyzing Mutation-Coded - VM Protect and Alcatraz
2
78
223
@keowu
João Vitor(Keowu)
24 days
Is anyone hiring for a reverse engineering role focused on malware analysis and detection engineering(with 5 years on this field)? I'm currently looking for my first international job opportunity. Please DM me!.
1
2
23
@keowu
João Vitor(Keowu)
3 months
My new article, "Writing a Full Windows ARM64 Debugger for Reverse Engineering," covers the topic in detail, including its internals and the core differences between Windows on Intel and ARM64:.
keowu.re
Author: João Vitor (@Keowu) - Security Researcher
4
84
270
@keowu
João Vitor(Keowu)
7 months
It's great to be part of this with the Maldec Labs team.
@maldeclabs
MalDec Labs
7 months
Koidbg is a powerful tool designed for binary analysis and debugging. It is designed with a focus on simplicity and efficiency, offering an intuitive interface for exploring compiled programs. @Microsoft .@MicrosoftBr . #Windows11 .#Windows .#Microsoft
0
0
9
@keowu
João Vitor(Keowu)
8 months
I'm happy to publish an exclusive version of my article on #H2HC such a great event.
Tweet media one
1
1
12
@keowu
João Vitor(Keowu)
11 months
Brazil is like a comedy play.
2
0
8
@keowu
João Vitor(Keowu)
1 year
That's my PoC(I've been forced to publish, after the disclosure timeline), sorry for that. please blacklist this driver to avoid problems.
@BleepinComputer
BleepingComputer
1 year
RansomHub ransomware operators have been spotted deploying new EDRKillShifter malware to disable endpoint detection and response (EDR) security software in Bring Your Own Vulnerable Driver (BYOVD) attacks - @serghei.
1
1
5
@keowu
João Vitor(Keowu)
1 year
Microsoft allows drivers with DRM (such as VmProtect) to be signed merely by submitting a PDB, without verifying it. Additionally, basic anti-rootkit checks are performed, but various cheat and anti-cheat companies end up breaking compatibility due to the lack of proper control.
0
0
3
@keowu
João Vitor(Keowu)
1 year
My new article. completely reversing the implementation of Gamespy from 2000-2004, reverse-engineering EA and Bungie games on original collector's editions to create our own emulator of the protocol used by it and play:.
keowu.re
Author: João Vitor (@Keowu) - Security Researcher
3
14
45
@keowu
João Vitor(Keowu)
1 year
RT @0xor0ne: Analysis of code mutations performed by VM Protect and Alcatraz obfuscation tools by João Vitor (@Keowu) . .
0
68
0
@keowu
João Vitor(Keowu)
1 year
Também disponível em português para quem preferir ler no meu idioma nativo.
keowu.re
Analisando códigos com mutação - VM Protect e Alcatraz
0
1
6
@keowu
João Vitor(Keowu)
1 year
What week guys, what week. but let's analysing some obfuscation stuff to avoid depression. see ya.
1
0
3
@keowu
João Vitor(Keowu)
2 years
"Do not say's PROCESS runs". There are a myth about it. Process itself don't run. thread runs every process has one thread. remember the real definition on windows kernel is that process are a container(that encapsulate a code with one thread). without that Kernel just delete it.
0
0
3
@keowu
João Vitor(Keowu)
2 years
It seems that the original account of the VmProtect creator, Ivan, is gradually posting source code slightly different from the leak that occurred with the tool last year. We can see that he made some commits 6 hours ago, publishing his own source code.
0
0
6
@keowu
João Vitor(Keowu)
2 years
RT @Unit42_Intel: #APT #AgonizingSerpens (aka #Agrius) has upgraded their capabilities. Analyzing a series of cyberattacks targeting #Israe….
0
16
0
@keowu
João Vitor(Keowu)
2 years
My project is able to detect syscall calls from a process (by installing an instrumentation callback) and retrieves their name, I also provided a way to detect this feature in any operating system process, I hope you like it.
Tweet card summary image
github.com
A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using InstrumentationCallback. - keowu/InstrumentationCallbackToolKit
0
0
3
@keowu
João Vitor(Keowu)
2 years
I decided to publish an article analyzing and explaining every detail of the WintaPix malware, originally disclosed by @Fortinet. My article aims to explain each aspect of the driver comprehensively and, of course, provide the complete source code.
0
0
3