
malware Owl
@malware_owl
Followers
129
Following
219
Media
8
Statuses
189
Entering the world of Malware (◎▼◎) =========== Since August 2022. Opinions expressed are my own and not those of my employer
Joined September 2022
Just created a Visualization Tool for YARA-x (by VirusTotal)! Doing this because I foresee myself writing lots lots of YARA from now on. Shall add on more features according to my own workflow in the future :D. #Yara
0
0
6
RT @MalwarePatrol: A recent #malware bypassed almost every public sandbox and antivirus, except and even evaded ED….
malwation.com
0
194
0
RT @fr0gger_: 💥 CERT-UA published a report on a malware powered by an LLM. The malware uses Qwen 2.5-Coder-32B-Instruct via the HuggingFac….
0
88
0
RT @D4mianWayne: Teaming with @gh0stbyt3, we built DiffRays for headless IDA (@HexRaysSA) decompilation. It stores decompiled code in a SQL….
0
39
0
RT @_revng: 🔥 So, at DEF CON there was a talk about deobfuscation: VMDragonSlayer by @Van1sh_BSidesIT. The author released the code and th….
0
50
0
RT @0xor0ne: Linux kernel fuzzing and vulnerability research (beginners intro). Part 1: Part 2: .
0
72
0
RT @RevEng_AI: 🚨 New blog post from @RevEng_AI! 🚨. We continue exploring the KorPlug malware family, focusing on i….
blog.reveng.ai
Executive Summary This analysis represents the second instalment in a comprehensive examination of the KorPlug malware family. Previous reporting detailed the initial loading vector utilising DLL...
0
4
0
RT @nhegde610: Wrote a new blog post on defeating string obfuscation in an obfuscated NodeJS malware sample using AST: . .
dinohacks.com
Defeating String Obfuscation in NodeJS Malware using Babel AST Parser
0
21
0
RT @just_avik: Completely agree with this order. You should never install a VPN, open a Tor connection on Brave, copy the .onion link of Z….
0
7K
0
RT @7hesage: Hey there! In our new research, I analyzed the details of in the wild privilege escalation vulnerability in clfs.sys. You can….
bi.zone
We look into the clfs.sys driver vulnerability that allows attackers to escalate privileges within the operating system
0
19
0
RT @chompie1337: I've been asked countless times how to learn VR & xdev. The answer is always: "do something you think is cool". It's hard….
github.com
Binary Exploitation Phrack CTF Challenge. Contribute to xforcered/PhrackCTF development by creating an account on GitHub.
0
143
0
Update: I have written a short writeup on how the decoding was done! With these knowledge, we can also attempt to create our own QR code by hand as well but try it at your own risk.
blog.0wl.sg
This is part 1 of PhrackCTF2025 whose QR code I thought was part of the challenge. This forced me to learn more about QR code to retrieve link to CTFd.
0
0
4
RT @_dru1d: I had a blast learning and working through some cool bug classes! It turns out the FAFO method can be useful for learning new t….
0
2
0
RT @Seifreed: 🎉 Excited to release #r2inspect - my malware analysis framework using @radareorg . 🔍 Analyze PE files with 28+ modules. 🛡️ De….
github.com
Advanced Malware Analysis Tool using Radare2 and r2pipe - seifreed/r2inspect
0
72
0
RT @frdfzi: Cyber_Safety_Checklist_2025.rar . #ToneShell uploaded from SG in 2025-07-30. Is HoneyMyte (Mustang Panda) currently targeting….
0
10
0
Attempted the PhrackCTF2025. Fun fact: I did not know that we are supposed to find another person with the other half of the QR code and I ended up decoded my half with Microsoft Excel Sheet. This is also possible because I have the side with all the data bits in them XD.Was
A few hours left - leaving it open until the morning on West Coast. Only 3 winners 🤭. Congrats @malware_owl and @_dru1d !!.
2
5
42
RT @vivekgalatage: Nearly 30 years since its release, "Distributed Algorithms" by Nancy Lynch remains a foundational text in distributed co….
0
77
0