hackerbecker's profile picture. Malware Analyst @PRODAFT - 
@_aucc, Karidesler CTF player
@hackerbecker@infosec.exchange

Ebubekir

@hackerbecker

Malware Analyst @PRODAFT - @_aucc, Karidesler CTF player @[email protected]

Ebubekir 已轉發

🐌 Subtle Snail (UNC1549), an Iran-nexus espionage group 🇮🇷, is targeting European 🇪🇺 telecom, aerospace, and defense organizations. The group uses LinkedIn HR lures and Azure-based C2. Read the full report 👉 catalyst.prodaft.com/public/report/… #ThreatIntel #Malware #APT #IOC

PRODAFT's tweet image. 🐌 Subtle Snail (UNC1549), an Iran-nexus espionage group 🇮🇷, is targeting European 🇪🇺 telecom, aerospace, and defense organizations. The group uses LinkedIn HR lures and Azure-based C2.

Read the full report 👉 catalyst.prodaft.com/public/report/…

#ThreatIntel #Malware #APT #IOC

Ebubekir 已轉發

🚨 BIG NEWS: THE SYS INITIATIVE 🚨 For years, cyber criminals have hidden in the shadows of forums. They operated behind fake names, encrypted channels, and closed communities. Reputation and trust were their most valuable currencies. Now is the time to shift from defense to…


Ebubekir 已轉發

Merhaba! Teknolojinin baş döndürücü hızla geliştiği günümüzde, siber güvenlik hepimizin gündeminde en üst sıralarda yer alıyor. 🤩 İşte tam bu yüzden, seni Siber Güvenlik Zirvesi 2025’e davet ediyoruz! 🚀 Bu etkinlikte: 💻 Alanında uzman konuşmacılardan en yeni siber tehdit…

_aucc's tweet image. Merhaba! Teknolojinin baş döndürücü hızla geliştiği günümüzde, siber güvenlik hepimizin gündeminde en üst sıralarda yer alıyor. 🤩 İşte tam bu yüzden, seni Siber Güvenlik Zirvesi 2025’e davet ediyoruz! 🚀

Bu etkinlikte:
💻 Alanında uzman konuşmacılardan en yeni siber tehdit…

Ebubekir 已轉發

Diferansiyel denklemler dersi almış mühendis bir tanıdığınız varsa , hayat boyu bu dersin anılarını dinleyeceksinizdir. Not: askerlik anılarıyla yarışır . xdxdxd


Ebubekir 已轉發

My first blog post, "Understanding the Process Environment Block (PEB) for Malware Analysis," is out! I've explained key PEB techniques and demonstrated them with examples from #StealC and #BlackMatter ransomware. metehan-bulut.medium.com/understanding-… #malware #ReverseEngineering #infosec


Ebubekir 已轉發

Since LOCKBIT’s first entry into the cybercrime ecosystem, we at PRODAFT have been assisting NCA, FBI and other partners of #OpCronos to better comprehend and disrupt this large criminal enterprise. Researching this ill-famous cybercrime syndicate has been challenging, but our…

PRODAFT's tweet image. Since LOCKBIT’s first entry into the cybercrime ecosystem, we at PRODAFT have been assisting NCA, FBI and other partners of #OpCronos to better comprehend and disrupt this large criminal enterprise.

Researching this ill-famous cybercrime syndicate has been challenging, but our…

Ebubekir 已轉發

a writeup for mobilehackinglab.com's "Damn Exploitable Android App" challenge. devilinside.me/blogs/android-…

echel0n_1881's tweet image. a writeup for mobilehackinglab.com's "Damn Exploitable Android App" challenge.
devilinside.me/blogs/android-…

Ebubekir 已轉發

Here, IDAPython script to count how many times a function has been called. High call count usually points to decryption functions in obfuscated malware. github.com/batcain/idapyt…

batcain_'s tweet image. Here, IDAPython script to count how many times a function has been called. High call count usually points to decryption functions in obfuscated malware.
github.com/batcain/idapyt…

Ebubekir 已轉發

🚀 We keep adding more fuel to our growing Spotify channel! 🎵 🤭 Each of our teams has a unique music taste (to say at least) - something you can definitely see reflected in the diverse range of playlists we have curated for y’all. Let’s see... 👀 🤺 Lively songs that make…

PRODAFT's tweet image. 🚀 We keep adding more fuel to our growing Spotify channel! 🎵

🤭 Each of our teams has a unique music taste (to say at least) - something you can definitely see reflected in the diverse range of playlists we have curated for y’all. 

Let’s see... 👀

🤺 Lively songs that make…

Ebubekir 已轉發

Why pay the ransom if you can decrypt your files? 🤔 💸 🕵️‍♂️ Last month, the PTI team noticed an emergence of a new ransomware dubbed PlutoCrypt. PlutoCrypt is a customized version of an ill-known malware #CryptoJoker. 🃏 It has been observed that the ransomware is targeting banks…

PRODAFT's tweet image. Why pay the ransom if you can decrypt your files? 🤔 💸

🕵️‍♂️ Last month, the PTI team noticed an emergence of a new ransomware dubbed PlutoCrypt. PlutoCrypt is a customized version of an ill-known malware #CryptoJoker. 🃏 It has been observed that the ransomware is targeting banks…

Ebubekir 已轉發

radareorg/radare2 disclosed a bug reported by @echel0n_1881 (CVE-2023-1605) - Patch: github.com/radareorg/rada… huntr.dev/bounties/9dddc… #hunter #infosec #opensource

huntrHacktivity's tweet image. radareorg/radare2 disclosed a bug reported by @echel0n_1881 (CVE-2023-1605) - Patch: github.com/radareorg/rada…
huntr.dev/bounties/9dddc… #hunter #infosec #opensource

Ebubekir 已轉發

We created our own socket relay 🎉🎊 github.com/qsocket/qsocket


Ebubekir 已轉發

My latest project, Evasion Escaper! It's a powerful tool that bypasses checks made by the malware to detect if it's running in a sandbox. It includes innovative techniques for DLL tracking and new bypass methods. Check it out and share your feedback! vvelitkn.com/malware%20anal…


Ebubekir 已轉發

Keyword exclude ekledim, keyword listesini deprem ile alakalı kelimelerle güncelledim. Kullanmak isteyen olursa buraya bırakıyorum. github.com/batcain/phishi… Şimdiye kadar bulduğum ve daha sonra bulacağım alan adlarını da aşağıdaki repoya ekliyor olacağım. github.com/batcain/olta

Merhaba, ben x0rz'a ait phishing catcher aracını kullanıyorum. Araç domainlere yeni alınmış sertifika streamini vereceğiniz keywordlere ve tldlere göre filtreliyor. Ancak, exclude mekanizması bulunmuyor. Dolayısıyla epey noise yaratıyor ve manuel kontrol gerektiriyor.



Ebubekir 已轉發

Currently looking for remote mid malware analyst/hunter job alongside reverse engineering, just so you know. End of transmission.


One of the best malware analyst and reverse engineer I know

Currently looking for remote mid malware analyst/hunter job alongside reverse engineering, just so you know. End of transmission.



Ebubekir 已轉發

Today’s #OALABS AMA… Malware Analysis Tips and Tricks 🧨 — One Trick To Level Up Your Reverse Engineering youtu.be/EjVVbM6ub00 — How To Identify Unknown Crypto Functions youtu.be/BGIDMpSztSk — .NET Static Config Extractor Tips youtu.be/n435uL01T_E

herrcore's tweet image. Today’s #OALABS AMA…

Malware Analysis Tips and Tricks 🧨

—
One Trick To Level Up Your Reverse Engineering

youtu.be/EjVVbM6ub00

—
How To Identify Unknown Crypto Functions

youtu.be/BGIDMpSztSk

—
.NET Static Config Extractor Tips

youtu.be/n435uL01T_E

—

Ebubekir 已轉發

📢📢 2022-2023 dönemi için tanışma toplantımızı gerçekleştirdik 🎉🎊 Güncel sunuma buradan erişebilirsiniz: raw.githubusercontent.com/AUCyberClub/sl…

_aucc's tweet image. 📢📢 2022-2023 dönemi için tanışma toplantımızı gerçekleştirdik 🎉🎊 Güncel sunuma buradan erişebilirsiniz: raw.githubusercontent.com/AUCyberClub/sl…
_aucc's tweet image. 📢📢 2022-2023 dönemi için tanışma toplantımızı gerçekleştirdik 🎉🎊 Güncel sunuma buradan erişebilirsiniz: raw.githubusercontent.com/AUCyberClub/sl…
_aucc's tweet image. 📢📢 2022-2023 dönemi için tanışma toplantımızı gerçekleştirdik 🎉🎊 Güncel sunuma buradan erişebilirsiniz: raw.githubusercontent.com/AUCyberClub/sl…

Ebubekir 已轉發

Hello guys! I created a helper #YARA module that gets the data at the given offset and size. Kudos to @_n1ghtw0lf for inspiring awesome blog post! Here is my blog post: devilinside.me/blogs/configur… You can find used samples and example usages in this repository:github.com/theatha/YARA_f…


Ebubekir 已轉發

. @tmpout'ın volume 1'inden tam 5 yazıyı Türkçe'ye tercüme eden @echel0n_1881 ve @batcain_, devamının da yolda olduğunu söyledi. Şuradan derginizi edinebilirsiniz: - tmpout.sh/1/tr/

__TTMO__'s tweet image. . @tmpout'ın volume 1'inden tam 5 yazıyı Türkçe'ye tercüme eden @echel0n_1881 ve @batcain_, devamının da yolda olduğunu söyledi. Şuradan derginizi edinebilirsiniz:
 - tmpout.sh/1/tr/

Loading...

Something went wrong.


Something went wrong.