decompilebug's profile picture. Security enthusiast/ novice reverse engineer

throatylava

@decompilebug

Security enthusiast/ novice reverse engineer

throatylava 님이 재게시함

Just recorded my first ever podcast, and it was for the Simply Offensive show with my @SuzuLabs coworker @PhillipWylie! Come watch it next Tuesday, 10/21/2025, and gain some wisdom into how to bust into the cybersec industry as I share insights from my own personal journey.…

hackerfren's tweet image. Just recorded my first ever podcast, and it was for the Simply Offensive show with my @SuzuLabs  coworker @PhillipWylie!

Come watch it next Tuesday, 10/21/2025, and gain some wisdom into how to bust into the cybersec industry as I share insights from my own personal journey.…

throatylava 님이 재게시함

Announcing our second RE//verse Keynote, Laurie Kirk! Laurie is a researcher at Google specializing Reverse Engineering, deobfuscation, and decompilation. She runs a YouTube channel (@LaurieWired) that covers all sorts of in-depth research topics on reverse engineering, low level…

REverseConf's tweet image. Announcing our second RE//verse Keynote, Laurie Kirk! Laurie is a researcher at Google specializing Reverse Engineering, deobfuscation, and decompilation. She runs a YouTube channel (@LaurieWired) that covers all sorts of in-depth research topics on reverse engineering, low level…

throatylava 님이 재게시함

I’m giving you a shortcut to making twice the money on average immediately, pay attention


throatylava 님이 재게시함

Finally some good news

It’s happening

IceSolst's tweet image. It’s happening
IceSolst's tweet image. It’s happening


throatylava 님이 재게시함

Watch the talk here: youtu.be/APwICrPsTCU?t=… #OBTS

OliviaGalluccii's tweet card. Objective by the Sea, v8.0. October 2025, Ibiza. (Live-Stream)

youtube.com

YouTube

Objective by the Sea, v8.0. October 2025, Ibiza. (Live-Stream)

Olivia (@oliviagalluccii) from @datadoghq entertained #OBTS, showing us how macOS logs everything, diving into ULS, ESF, and TCC.db to hunt threats like Atomic Stealer & XCSSET, and using tools like Consolation3, eslogger, Mac Monitor to catch evil!

forensicdave's tweet image. Olivia (@oliviagalluccii) from @datadoghq entertained #OBTS, showing us how macOS logs everything, diving into ULS, ESF, and TCC.db to hunt threats like Atomic Stealer & XCSSET, and using tools like Consolation3, eslogger, Mac Monitor to catch evil!


throatylava 님이 재게시함

Just posted a write-up on a DC hang traced to a deadlock inside LSASS. I break down call stacks, the blocked threads, and how doing LDAP work in DllMain triggered the issue. medium.com/@Debugger/serv…


throatylava 님이 재게시함

oneline bash command to backup all your github repositories (public and private, including forks): pastebin.com/zLezkfw8


Yeah, tbh without any programming experience, understanding security feels like deciphering hieroglyphics.🤣🤣🤣🤣

Students should not be graduating straight into Cybersecurity Please go be developers first



Many Modern day games and hip hop/electronic music suffer from this. People back in the day did groundbreaking stuff with limited memory/sample time. Guess, they truly cared about their projects. Nowadays, it’s more hype, less substance.

Constraints drive creativity. Which low/no funding, you HAVE to be creative. Abundant funds bring delusions of grandeur and overengineered solutions.



Changed my resume up finally. Man, I took a big spit at my older one. Abysmal much.🤣🤣🤣


throatylava 님이 재게시함

Come see my talk at Objective by the Sea on Thursday! 👩🏻‍💻 I'm so excited and honored to present my research at this amazing conference. + My talk will be streamed. I'll post the link on Thursday! @objective_see #InfoSec #OBTS

OliviaGalluccii's tweet image. Come see my talk at Objective by the Sea on Thursday! 👩🏻‍💻

I'm so excited and honored to present my research at this amazing conference.

+ My talk will be streamed. I'll post the link on Thursday!

@objective_see #InfoSec #OBTS

throatylava 님이 재게시함

New XINTRA course‼️ Advanced IIS Post Exploitation, Detection & Evasion Modern APT groups are actively weaponizing ToolShell and fileless IIS tradecraft to compromise Exchange, SharePoint, ASP workloads. If your detection and response capabilities lag exposure, this course…

inversecos's tweet image. New XINTRA course‼️
Advanced IIS Post Exploitation, Detection & Evasion

Modern APT groups are actively weaponizing ToolShell and fileless IIS tradecraft to compromise Exchange, SharePoint, ASP workloads.

If your detection and response capabilities lag exposure, this course…
inversecos's tweet image. New XINTRA course‼️
Advanced IIS Post Exploitation, Detection & Evasion

Modern APT groups are actively weaponizing ToolShell and fileless IIS tradecraft to compromise Exchange, SharePoint, ASP workloads.

If your detection and response capabilities lag exposure, this course…

throatylava 님이 재게시함

it's like an annual reverse engineering marathon: flare-on.com - here are some of my solutions from the previous year, if you are curious: hshrzd.wordpress.com/category/ctf/


throatylava 님이 재게시함

I’m not anti-AI. I am, however, anti the rapacious tech bros who selfishly hype AI for the purpose of increasing their wealth and power at the expense of our humanity.


Anyone here a C programming wizard? Have some questions to ask.


Bro 🤣🤣🤣

You have multiple bird app accounts because you’re afraid to post cringe on main I have multiple bird app accounts because my multiple personalities demand their own separate outlets We are not the same



throatylava 님이 재게시함

Wanted small ascii art for a cli tool im building so i commissioned the illustrious @littlebitspace :)


🤣🤣🤣

Are you in charge of writing Cybersecurity incident reports and need to spice up the language so the report isn’t so boring?? Try this, instead of saying we suffered a breach due to the compromise of a 3rd party: > we got fucked in the aaS Follow me for more pro writing tips



throatylava 님이 재게시함

Interested in working with me? We're looking to hire Software Engineers with strong expertise in C# to maintain our .NET modules we use and like to RE Windows components! Great culture, benefits, and we will have some fun WinDbg sessions together :D ats.rippling.com/netwrix-corpor…


United States 트렌드

Loading...

Something went wrong.


Something went wrong.