wirehack7's profile picture. Another #ITSec guy. Incident Response and RE | GREM |
Plague doctor to malware and scums, curing the pest since 2013 w/ #MalwareMustDie

๐–’๐–†๐–—๐–๐–š๐–˜

@wirehack7

Another #ITSec guy. Incident Response and RE | GREM | Plague doctor to malware and scums, curing the pest since 2013 w/ #MalwareMustDie

๐–’๐–†๐–—๐–๐–š๐–˜ reposted

Finding vulnerabilities in DJI drones: reverse engineering, firmware decryption, and dynamic analysis (fuzzing). ๐Ÿ‘จโ€๐Ÿ’ปโฏโฏ๐Ÿ›ธ๐Ÿซจ๐Ÿชฒ More details on: LinkedIn: linkedin.com/posts/dlaskov_โ€ฆ Substack: it4sec.substack.com/p/finding-vulnโ€ฆ

it4sec's tweet image. Finding vulnerabilities in DJI drones: reverse engineering, firmware decryption, and dynamic analysis (fuzzing). ๐Ÿ‘จโ€๐Ÿ’ปโฏโฏ๐Ÿ›ธ๐Ÿซจ๐Ÿชฒ

More details on: 
LinkedIn: linkedin.com/posts/dlaskov_โ€ฆ
Substack: it4sec.substack.com/p/finding-vulnโ€ฆ

It's 2025 and you still don't support ipv6 @github? My stack has only v6๐Ÿ˜


๐–’๐–†๐–—๐–๐–š๐–˜ reposted

Just wondering how many of us are actually rebooting (turning off and on again) our mobile phone devices everyday? #MalwareMustDie #Poll


๐–’๐–†๐–—๐–๐–š๐–˜ reposted

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... ๐Ÿงต1/n

taviso's tweet image. This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... ๐Ÿงต1/n

๐–’๐–†๐–—๐–๐–š๐–˜ reposted

Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language. Since I am a professional C++ programmer, let me decode this stack trace dump for you.

Perpetualmaniac's tweet image. Crowdstrike Analysis:

It was a NULL pointer from the memory unsafe C++ language.

Since I am a professional C++ programmer, let me decode this stack trace dump for you.

So, when is #crowdstrike demanding ransom? Just good business cases ๐Ÿ˜…


๐–’๐–†๐–—๐–๐–š๐–˜ reposted
mirwanda443's tweet image. #crowdstrike #bsod

Nice learning material on real ELF malware. Thanks a lot! #infosec #reversing

#Blog: Back in 2015, where #Linux #Ransomware was started to came up to the surface, I posted an analysis that I forgot to post it in #MMD blog in English until just now.. So, I am sorry, better late than never. Here it is: blog.malwaremustdie.org/2024/06/mmd-06โ€ฆ #MalwareMustDie!



๐–’๐–†๐–—๐–๐–š๐–˜ reposted

#Blog: I re-posted my older #APT #PoisonIvy analysis in #MMD blog before it becomes /dev/null :) blog.malwaremustdie.org/2024/06/mmd-06โ€ฆ #MalwareMustDie!


As a tweet poster the likes to the tweet are not anonymous, the poster sees who is liking the tweet. That's as expected @XEng?


Garage gate wardriving. Why not? Get 'em keys rolling!


it's 2024 and websites like wordpress.org @WordPress still don't support ipv6. AAAA record missing. Is it rocket science to also offer ipv6? Or is ipv6 too new? #wordpress #IPv6


๐–’๐–†๐–—๐–๐–š๐–˜ reposted

Dieses Jahr waren wir wie immer beim #CCC Kongress, #37c3, dabei ๐Ÿ˜Ž๐Ÿ‘พ Es gab interessante Einblicke und SpaรŸ ๐Ÿ‘Œ Die Telnet Challenge hat #iSecNG gerockt, denn wir sprechen Klartext. Bis zum nรคchsten Mal und einen guten Rutsch ๐ŸŽ‰ Das iSecNG Team

iSecNG's tweet image. Dieses Jahr waren wir wie immer beim #CCC Kongress, #37c3, dabei ๐Ÿ˜Ž๐Ÿ‘พ
Es gab interessante Einblicke und SpaรŸ ๐Ÿ‘Œ
Die Telnet Challenge hat #iSecNG gerockt, denn wir sprechen Klartext. 
Bis zum nรคchsten Mal und einen guten Rutsch ๐ŸŽ‰

Das iSecNG Team
iSecNG's tweet image. Dieses Jahr waren wir wie immer beim #CCC Kongress, #37c3, dabei ๐Ÿ˜Ž๐Ÿ‘พ
Es gab interessante Einblicke und SpaรŸ ๐Ÿ‘Œ
Die Telnet Challenge hat #iSecNG gerockt, denn wir sprechen Klartext. 
Bis zum nรคchsten Mal und einen guten Rutsch ๐ŸŽ‰

Das iSecNG Team

Vote and maybe reply here for non listed sandboxes. Would be also to share why. #infosec #sandbox #malware pls help to RT if you want. Sharing the love, thanks! โค๏ธ

#MMD #Poll: What would you pick as your online #malware analysis #sandbox today? Type other stuff if not listed (i.e. Hybrid Analysis)



๐–’๐–†๐–—๐–๐–š๐–˜ reposted

#Xbox isnโ€™t abandoning consoles anytime soon. In a graph @Microsoft Gamingโ€™s CEO, Phil Spencer, used in the FTC hearing relating to the acquisition of Activision Blizzard King, they showed the potential growth of the Microsoft Gaming brand from 2023 to 2030. This chart showed aโ€ฆ

GAMERNEWSonX's tweet image. #Xbox isnโ€™t abandoning consoles anytime soon.

In a graph @Microsoft Gamingโ€™s CEO, Phil Spencer, used in the FTC hearing relating to the acquisition of Activision Blizzard King, they showed the potential growth of the Microsoft Gaming brand from 2023 to 2030.

This chart showed aโ€ฆ

๐–’๐–†๐–—๐–๐–š๐–˜ reposted

Thank you for all of friends for the amazing support along these 11years+. If you are following our #malwaremustdie/#MMD's twitter/x account @malwaremustdie up to now & got disconnected please follow this official account to keep in touch. -- MMD


๐–’๐–†๐–—๐–๐–š๐–˜ reposted

Rockstar is selling cracked game copies on Steam

realCrackWatch's tweet image. Rockstar is selling cracked game copies on Steam

๐–’๐–†๐–—๐–๐–š๐–˜ reposted

"HHHash: HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns." #infosec #pentest #redteam github.com/adulau/HHHash

CyberWarship's tweet image. "HHHash: HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns."

#infosec #pentest #redteam 
github.com/adulau/HHHash

๐–’๐–†๐–—๐–๐–š๐–˜ reposted

The Forum of Incident Response and Security Teams (#FIRST) is proud to announce the official release of #CVSS v4.0 #ThePublicPreview. The latest information on CVSS v4.0 can be found at first.org/cvss/v4-0/ #FIRSTCON23

FIRSTdotOrg's tweet image. The Forum of Incident Response and Security Teams (#FIRST) is proud to announce the official release of #CVSS v4.0 #ThePublicPreview. The latest information on CVSS v4.0 can be found at first.org/cvss/v4-0/ #FIRSTCON23

Loading...

Something went wrong.


Something went wrong.