R136a1

@TheEnergyStory

Malware Researcher @ Palo Alto Networks | Founder & Admin of

Amsterdam
Vrijeme pridruživanja: ožujak 2013.

Tweetovi

Blokirali ste korisnika/cu @TheEnergyStory

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TheEnergyStory

  1. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Unwinding RTCore - response to recent Unwinder claims and behavior related to vulnerabilities found in his RTCore driver which is a part of MSI Afterburner,

    Poništi
  3. 24. sij

    IOCs, the decompiled C# code with deobfuscated strings, a registry data config decrypter (for those who are infected) and some information of the Project TajMahal malware sample uploaded in 2019 to Virustotal:

    Poništi
  4. 14. pro 2019.

    Archive of is now available | All attachments are public | Note that attachments have PHP file extension but are actually archives | Rename according to its file type (ZIP, RAR, ...) and open it | Thanks for everybody who contributed over those ~10 years!

    Poništi
  5. proslijedio/la je Tweet
    21. stu 2019.

    Investigating a in Central Europe and the Middle East, discovered a highly unusual downloader. Apart from other nontraditional techniques, the also poses as a default print monitor.

    Poništi
  6. proslijedio/la je Tweet
    9. ruj 2019.

    discovered a backdoor linked to used by the Stealth Falcon group, an operator of targeted attacks against , activists and dissidents in the Middle East.

    Poništi
  7. proslijedio/la je Tweet
    2. kol 2019.

    Decided to released my slides from the talk i presented some years ago. As i've heard this card cloning techniques is still in use nowadays, study and learn how to deal with this stuff.

    Poništi
  8. proslijedio/la je Tweet
    28. srp 2019.
    Poništi
  9. proslijedio/la je Tweet
    10. srp 2019.

    Windows zero-day CVE-2019-1132 exploited in targeted attacks

    Poništi
  10. proslijedio/la je Tweet
    14. svi 2019.

    Recently, the Plead malware has been deployed via legitimate ASUS WebStorage software. There are two possible attack scenarios: supply-chain or man-in-the-middle at router level. In this blog I'm trying to explain why MitM is the most likely scenario:

    Prikaži ovu nit
    Poništi
  11. 26. tra 2019.

    Verifying myself: I am r136a1 on . BoOpb1Mlenjz5Mlt6zav86UQaJd7_dohram1 /

    Poništi
  12. proslijedio/la je Tweet
    25. tra 2019.

    Posted a new blog for work - Takedowns and Adventures in Deceptive Affiliate Marketing

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    20. tra 2019.

    WDExtract, tool for working with Windows Defender database files + Unpack VDM containers of Windows Defender/Microsoft Security Essentials; + Decrypt VDM container embedded in MS MRT; + Extract VDLLs/VFS contents from containers and other PE files.

    Poništi
  14. 8. tra 2019.
    Poništi
  15. 1. tra 2019.

    TDL4, Gootkit and Xpaj bootkit source codes:

    Poništi
  16. 28. ožu 2019.
    Poništi
  17. 27. ožu 2019.
    Prikaži ovu nit
    Poništi
  18. 27. ožu 2019.
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    17. ožu 2019.

    database for the masses with lots of samples, rules and more

    Poništi
  20. proslijedio/la je Tweet
    13. ožu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·