Moonbeom(Daniel)
@krNeoTra
Followers
952
Following
9K
Media
69
Statuses
5K
CPO(Chief Product Officer) at 78ResearchLab, Hacking incident analysis, Digital Forensic, Research on hacking technique, Profiling hacking source.
Joined September 2010
#exploit 1โฃ. CVE-2025-50165: Critical Flaw (RCE) in Windows Graphics Component - https://t.co/p3KATYNDYX // Windows 11 24H2 x64/ARM64, Windows Server 2025 2โฃ. CVE-2025-9491: Windows UI misrepresentation vulnerability - https://t.co/9qKIOSQ7Fd // PoC tool for demonstrating the
zscaler.com
CVE-2025-50165, a flaw in the Microsoft Windows Graphics Component, enables attackers to execute code remotely without privileges using a malicious JPEG.
0
2
3
๐จ Indirect-Shellcode-Executor Tool Exploits Windows API Vulnerability to Evade AV and EDR Source: https://t.co/uR14i7Wq5r A new offensive security tool developed in Rust is demonstrating a novel method for bypassing modern Endpoint Detection and Response (EDR) systems by
4
125
430
Analysis and Exploit Demo of the CVE-2024-38077(Windows Remote Desktop Licensing Service Pre-auth 0-Click Remote Code Execute Vulnerability) https://t.co/gEWn6IkeCi
#0_Click_RCE #CVE_2024_38077 #Remote_Desktop
0
0
1
#ParallelPulse @nanosec_asia 2025 kicks off with our Technical Training series! Welcome back to KL @krNeoTra & Sangsoo Jeong of @78_lab ! The stage is set. ๐ฆธโโ๏ธ ๐ถ๐พโ๐๐พ ๐๐พ๐บ๐ฝ๐! ๐๐๐พ ๐๐พ๐บ๐
๐๐๐พ๐๐๐๐๐ ๐๐: ๐ ๐ฑ๐ค U?! ๐ https://t.co/jBLXTqIf1m
0
5
7
#ParallelPulse wrapped up ๐๐๐ฏ๐๐ง๐๐๐ ๐๐ก๐ซ๐๐๐ญ ๐๐ฎ๐ง๐ญ๐ข๐ง๐ & ๐๐ training with an amazing cohort! Huge ๐ซถ to everyone who dug into the labs & pushed through the challenges. ๐to @krNeoTra & Sangsoo @78_lab for your amazing sharing. Onward we go, stronger & sharper!
0
2
10
๐Think #ParallelPulse is โtoo technicalโ? Nah-itโs built for everyone who cares about cyber resilience. Whether youโre in security, IT, audit, or leadership, weโve got sessions that break down complex threats into real-world impact you can actually use. https://t.co/JUdp71IdH4
0
5
5
๐ #ParallelPulse '25 agenda is LIVE! 2 days of high-impact talks, deep-dive tech sessions & max fun! +๐ปawesome activities! 1๏ธโฃ @sherpasecmy SherpaCTF2025 2๏ธโฃ @stealthmole_int OSINT Hands-On 3๏ธโฃ The Range Village AD Range https://t.co/jBLXTqIf1m
https://t.co/2pJqqwBzOk
0
9
17
#Lazarus have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint/.io to host and deliver malware from trojanized code projects, with the lure being a use case or demo project as part of an interview process. #InvisibleFerret
1
8
28
#exploit High severity Windows vulnerabilities: 1โฃ. CVE-2025-26686: RCE in Windows 10/11/Srv TCP/IP stack - https://t.co/kswysi2zzg // leaves sensitive memory unlocked, allowing remote attackers to hijack systems. Exploitable over the network, it risks full compromise. Patch
github.com
A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hijack systems. Exploitable over the network, it risks full comp...
3
47
170
๐จ New talk #ParallelPulse2025: @78_lab breaks down Gunra, a Conti-variant that hit major SK banks. Learn how @78_lab reverse-engineered the malware, found a critical vuln & replicated decryption via a known-plaintext attack. ๐ https://t.co/ZXy0cHrO9Q
0
3
8
๊น์ํค(Kimsuky) ํ์ปด ์์ด์ ํธ-๊ตญ๋ด Aํ๊ฐ์ผ ํํฉ ๋ฐ ์๋ฐฉ์ ์ข
๊ถ๊ณ ๋์์ ์๋ด.pdf.scr.exe https://t.co/c8Fbo0C8mY #๊น์ํค #Kimsuky #์
์ฑ์ฝ๋
wezard4u.tistory.com
์ค๋์ ๋ถํ ๊น์ํค ์์ ๋ง๋ ์
์ฑ์ฝ๋์ธ ๊ตญ๋ด Aํ๊ฐ์ผ ํํฉ ๋ฐ ์๋ฐฉ์ ์ข
๊ถ๊ณ ๋์์ ์๋ด.pdf.scr.exe์ ๋ํด์ ๊ฐ๋จํ๊ฒ ์์๋ณด๋ ์๊ฐ์ ๊ฐ์ ธ ๋ณด๊ฒ ์ต๋๋ค.ใใกใคใซๅ:๊ตญ๋ด Aํ๊ฐ์ผ ํํฉ ๋ฐ ์๋ฐฉ์ ์ข
๊ถ๊ณ ๋์์ ์๋ด.pdf.scr.exeใตใคใบ:3 MBMD5:0f3e5058154de146fb3f1921c7f89952SHA-1:6a79104f950...
0
1
1
Hello, while investigating the Midnight or EndPoint ransomware, for which a decryption tool was recently released, I discovered several suspicious points and decided to compile a brief report about them Report : https://t.co/HvJZIEkkgl
#Ransomware #Kimsuky #Lazarus #APT
github.com
Contribute to errbody/DPRK-Research development by creating an account on GitHub.
0
18
87
Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure https://t.co/hmbhV2oDD0
0
38
192
๊น์ํค(Kimsuky) ํ์ ์์ ๋ถ ์ฌ์นญ ์ด๋ฉ์ผ ๋ถ์(2025.10.9) https://t.co/zAYFcoh2Bf #๊น์ํค #Kimsuky
wezard4u.tistory.com
์ค๋์ ๋ถํ ๊น์ํค(Kimsuky) ํ์ ์์ ๋ถ ์ฌ์นญ ์ด๋ฉ์ผ ๋ถ์(2025.10.9)์ ๋ํด์ ์์์ญํ์ ์ผ๋ก ๋ถ์์ผ๋ก ํด๋ณด๊ฒ ์ต๋๋ค. wwwwํด๋น ํผ์ฑ ๋ฉ์ผ์ ํ์ ์์ ๋ถ์์ ๋ณด๋ธ ๊ฒ์ผ๋ก ๋ผ ์์ง๋ง, ํ์๋ถ์์ ๊ทธ๋ฐ ๊ฒ์ ๋ณด๋ธ ๊ฒ์ด ์๋ ํผ์ฑ ๋ฉ์ผ ์
๋๋ค.ํผ์ฑ ๋ฉ์ผ ๋ด์ฉ์๋ก์ด ์ ์๋ฌธ์๊ฐ ๋์ฐฉํ์ด์. ???**** ๋, ์ง๊ธ ํ์ธํด๋ณด์ธ์. ๊ฐ์ธ์ ๋ณด๊ฐ ํฌํจ๋...
0
1
1