evandrix

@evandrix

-->&apos;"/></sCript><svG x=">" onload=(co\u006efirm)``>

den id=init-data class=jso
Joined July 2009

Tweets

You blocked @evandrix

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @evandrix

  1. Retweeted
    4 hours ago

    PEP: An open source PDF editor for Mac (early stage)

    Undo
  2. Retweeted
    9 hours ago

    Minor updates: - Near completion of Windows malcode collection - Additional VX libraries will be added soon - Linux malcode in queue - 12% of Malware samples sanitized - APT collection still in progress Big news coming soon. More updates to come tomorrow. 1luv -smelly

    Undo
  3. Retweeted
    Sep 14

    C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed

    Undo
  4. Retweeted
    20 hours ago
    Undo
  5. Retweeted
    25 Nov 2019

    Want to classify process injection by Windows API calls? Check out the new poster made by and me!

    Undo
  6. Retweeted
    19 hours ago

    my friend sophie got fired from her job at Facebook and turned down a $64,000 severance package in order to leak this, so u better read it.

    Show this thread
    Undo
  7. Retweeted
    Sep 14

    We have published hfinger - malware HTTP request fingerprinter. It represents requests in a shorter form, but still human interpretable. Created fingerprints provide good uniqueness in identifying malware families.

    Undo
  8. Retweeted
    18 hours ago

    capa v1.3 released with a bunch of new stuff, including mappings to Malware Behavior Catalog (MBC) 2.0 and polish to the IDA Pro plugin by . Oh, and the library on PyPI! Seven new contributors added rules, features, and bug reports!

    Undo
  9. Retweeted
    14 hours ago

    How HTTPS Works

    Undo
  10. Retweeted
    20 hours ago
    Undo
  11. Retweeted
    20 hours ago

    A Database for Every Repl

    Undo
  12. Retweeted
    20 hours ago
    Undo
  13. Retweeted
    22 hours ago

    Today in AV evasion, Microsoft didn't try very hard to find 's ctftool.exe. A story in three parts:

    Show this thread
    Undo
  14. Retweeted
    23 hours ago

    use fake functions for increasing entropy, this replace by regex by a rotation of the same characters (@,^,),*,#,(,!) the content for getting the path and all commands to perform.This uses a folder as kill switch (created by the second stager downloaded and executed).

    Show this thread
    Undo
  15. Retweeted
    23 Sep 2016
    Replying to
    Undo
  16. Retweeted
    23 Sep 2016

    oh dear god this capcom.sys has an ioctl that disables smep and calls a provided function pointer, and sets SMEP back what even

    Undo
  17. Retweeted
    Sep 14
    Replying to

    Cats, Unicorns, Owls and Jakes.

    Undo
  18. Retweeted
    Sep 14

    Q: A faster re-implementaiton of jq written in Reason Native/OCaml

    Undo
  19. Retweeted
    Sep 14
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·