Nazywam

@nazywam

Playing , poking malwares with a stick

Cyber Outer Space
Vrijeme pridruživanja: lipanj 2011.

Tweetovi

Blokirali ste korisnika/cu @nazywam

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @nazywam

  1. proslijedio/la je Tweet
    29. sij

    Abuse[.]ch has launched today a new free tool called "I Got Phished" that notifies companies when their employees get phished

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    19. sij

    Microsoft warns of a critical Internet Explorer vulnerability (CVE-2020-0674). It allows a remote attacker to execute arbitrary code on targeted systems. We strongly recommend users to switch to another browser or increase monitoring, at least until a patch is available.

    Poništi
  3. 17. sij

    Fattura-17.01.20.xls d4df569ab928bbdd99d30d87e5b6c9c394f3b221b2c9a4ae410be56e9affd64c dropped from https://att-0748.fileshare-storage[.]com/download.php c2: https://reselling-corp[.]com/2020hny thx urlhaus!

    Poništi
  4. proslijedio/la je Tweet
    3. sij

    🚀 Launch Day 🚀 It’s official this project that and I have been a part of for 5 years is now available as a free public Beta! Automated malware unpacking!

    Poništi
  5. 9. sij

    And the cycle of CTF reverse-engineering challenges continues cc

    Poništi
  6. proslijedio/la je Tweet
    22. pro 2019.

    CTF Reversing challenge bingo

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    19. pro 2019.

    We are releasing a free decryption tool for the (a GarrantyDecrypt/Outsider variant). Detailed instructions are available on our blog: Special thanks to for collaboration

    Poništi
  8. proslijedio/la je Tweet
    18. pro 2019.

    Python 3 version of PNG decryptor & PE reconstructor for steganographic loader used by /, co-authored with . PNG: 8fca57502cbd74502560bf963f3fd78acfc922b43d5973a0cd8f28426214abca Cc:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    14. pro 2019.

    Pełna sala na prezentacji i na . Opowiadali o psuciu szyków operatorom RAT-ów. Świetny sposób prezentacji;)

    Poništi
  10. proslijedio/la je Tweet
    19. stu 2019.

    In our short article we present an analysis of an xls document that has been used as a dropper distributing another well-known dropper – .

    Poništi
  11. 15. stu 2019.
    Poništi
  12. proslijedio/la je Tweet
    21. lis 2019.

    I just published an in-depth analysis of how the network protocol works. Also I've released a tool which emulated this protocol and is capable to download new & from the C&Cs. It's integrated with and .

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    8. lis 2019.

    The IDApython cheat sheets from Pavel Rusanov are now available as PDFs.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    4. lis 2019.
    Odgovor korisnicima

    I think that the server which drops the ursnif binary may actually not related to emotet. All emotet payload urls that I've seen don't have the basename included in the url (they finish with a `/`) where as the new non-emotet drops have the file specified (`.../apikey/data.exe`)

    Poništi
  15. 4. lis 2019.

    Original doc downloaded from http://www.yuyihui[.]cn/wp-content/uploads/2019/10/details.doc sha256 4558e1259e144fba3d87088b9ba89114b3106b8d6eca06376221b9bbb97cebf7

    Prikaži ovu nit
    Poništi
  16. 4. lis 2019.

    Found something pretty odd, doc look-alike dropping /? The powershell payload looks almost identical to the one dropping emotet, the way it is embedded and decoded from doc is identical🤔 cc Tracking paste:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    1. lis 2019.

    Looking forward to attending with this year. If anyone wants to talk about malware research, discuss stuff or just grab some beer, feel free to DM one of us.

    Poništi
  18. proslijedio/la je Tweet
    25. ruj 2019.

    For all our xakep users out there, finally got its fully fledged command-line client: It has almost all capabilities of the web interface including downloading objects, adding relations and searching through all object types.

    Poništi
  19. proslijedio/la je Tweet
    22. ruj 2019.

    The Teaser Dragon CTF 2019 is now over! TOP1: PPP TOP2: p4 TOP3: Balsn Full scoreboard: Congratz all around! If you've played our CTF, please fill out our post-CTF survey: (and don't forget to vote on CTF time) GG WP!

    Poništi
  20. proslijedio/la je Tweet
    16. ruj 2019.

    We have published our annual report "Security landscape of the Polish Internet 2018". Feel free to share :-)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·