
Ebubekir
@hackerbecker
Malware Analyst @PRODAFT - @_aucc, Karidesler CTF player @[email protected]
Was dir gefallen könnte
🐌 Subtle Snail (UNC1549), an Iran-nexus espionage group 🇮🇷, is targeting European 🇪🇺 telecom, aerospace, and defense organizations. The group uses LinkedIn HR lures and Azure-based C2. Read the full report 👉 catalyst.prodaft.com/public/report/… #ThreatIntel #Malware #APT #IOC

🚨 BIG NEWS: THE SYS INITIATIVE 🚨 For years, cyber criminals have hidden in the shadows of forums. They operated behind fake names, encrypted channels, and closed communities. Reputation and trust were their most valuable currencies. Now is the time to shift from defense to…
Merhaba! Teknolojinin baş döndürücü hızla geliştiği günümüzde, siber güvenlik hepimizin gündeminde en üst sıralarda yer alıyor. 🤩 İşte tam bu yüzden, seni Siber Güvenlik Zirvesi 2025’e davet ediyoruz! 🚀 Bu etkinlikte: 💻 Alanında uzman konuşmacılardan en yeni siber tehdit…

Diferansiyel denklemler dersi almış mühendis bir tanıdığınız varsa , hayat boyu bu dersin anılarını dinleyeceksinizdir. Not: askerlik anılarıyla yarışır . xdxdxd
My first blog post, "Understanding the Process Environment Block (PEB) for Malware Analysis," is out! I've explained key PEB techniques and demonstrated them with examples from #StealC and #BlackMatter ransomware. metehan-bulut.medium.com/understanding-… #malware #ReverseEngineering #infosec
Since LOCKBIT’s first entry into the cybercrime ecosystem, we at PRODAFT have been assisting NCA, FBI and other partners of #OpCronos to better comprehend and disrupt this large criminal enterprise. Researching this ill-famous cybercrime syndicate has been challenging, but our…

a writeup for mobilehackinglab.com's "Damn Exploitable Android App" challenge. devilinside.me/blogs/android-…

Here, IDAPython script to count how many times a function has been called. High call count usually points to decryption functions in obfuscated malware. github.com/batcain/idapyt…

🚀 We keep adding more fuel to our growing Spotify channel! 🎵 🤭 Each of our teams has a unique music taste (to say at least) - something you can definitely see reflected in the diverse range of playlists we have curated for y’all. Let’s see... 👀 🤺 Lively songs that make…

Why pay the ransom if you can decrypt your files? 🤔 💸 🕵️♂️ Last month, the PTI team noticed an emergence of a new ransomware dubbed PlutoCrypt. PlutoCrypt is a customized version of an ill-known malware #CryptoJoker. 🃏 It has been observed that the ransomware is targeting banks…

radareorg/radare2 disclosed a bug reported by @echel0n_1881 (CVE-2023-1605) - Patch: github.com/radareorg/rada… huntr.dev/bounties/9dddc… #hunter #infosec #opensource

We created our own socket relay 🎉🎊 github.com/qsocket/qsocket
My latest project, Evasion Escaper! It's a powerful tool that bypasses checks made by the malware to detect if it's running in a sandbox. It includes innovative techniques for DLL tracking and new bypass methods. Check it out and share your feedback! vvelitkn.com/malware%20anal…
Keyword exclude ekledim, keyword listesini deprem ile alakalı kelimelerle güncelledim. Kullanmak isteyen olursa buraya bırakıyorum. github.com/batcain/phishi… Şimdiye kadar bulduğum ve daha sonra bulacağım alan adlarını da aşağıdaki repoya ekliyor olacağım. github.com/batcain/olta
github.com
GitHub - batcain/phishing_catcher: Phishing catcher using Certstream
Phishing catcher using Certstream. Contribute to batcain/phishing_catcher development by creating an account on GitHub.
Merhaba, ben x0rz'a ait phishing catcher aracını kullanıyorum. Araç domainlere yeni alınmış sertifika streamini vereceğiniz keywordlere ve tldlere göre filtreliyor. Ancak, exclude mekanizması bulunmuyor. Dolayısıyla epey noise yaratıyor ve manuel kontrol gerektiriyor.
Currently looking for remote mid malware analyst/hunter job alongside reverse engineering, just so you know. End of transmission.
One of the best malware analyst and reverse engineer I know
Currently looking for remote mid malware analyst/hunter job alongside reverse engineering, just so you know. End of transmission.
Today’s #OALABS AMA… Malware Analysis Tips and Tricks 🧨 — One Trick To Level Up Your Reverse Engineering youtu.be/EjVVbM6ub00 — How To Identify Unknown Crypto Functions youtu.be/BGIDMpSztSk — .NET Static Config Extractor Tips youtu.be/n435uL01T_E —

📢📢 2022-2023 dönemi için tanışma toplantımızı gerçekleştirdik 🎉🎊 Güncel sunuma buradan erişebilirsiniz: raw.githubusercontent.com/AUCyberClub/sl…



Hello guys! I created a helper #YARA module that gets the data at the given offset and size. Kudos to @_n1ghtw0lf for inspiring awesome blog post! Here is my blog post: devilinside.me/blogs/configur… You can find used samples and example usages in this repository:github.com/theatha/YARA_f…
. @tmpout'ın volume 1'inden tam 5 yazıyı Türkçe'ye tercüme eden @echel0n_1881 ve @batcain_, devamının da yolda olduğunu söyledi. Şuradan derginizi edinebilirsiniz: - tmpout.sh/1/tr/

United States Trends
- 1. Ohtani 197K posts
- 2. Dodgers 242K posts
- 3. Dodgers 242K posts
- 4. Carson Beck 16.1K posts
- 5. $SAWA 1,656 posts
- 6. Miami 99.3K posts
- 7. Louisville 27.5K posts
- 8. Nebraska 17.6K posts
- 9. Brewers 54.5K posts
- 10. Babe Ruth 3,084 posts
- 11. NLCS 56.3K posts
- 12. #SmackDown 55.8K posts
- 13. #BostonBlue 7,707 posts
- 14. Rhule 4,492 posts
- 15. 3 HRs 10K posts
- 16. Minnesota 47.8K posts
- 17. Emiru 4,557 posts
- 18. George Santos 78.9K posts
- 19. 10 Ks 4,295 posts
- 20. Jeff Brohm 3,028 posts
Was dir gefallen könnte
Something went wrong.
Something went wrong.