Sascha Curylo

@sculabs

Malware Analyst @ G DATA

Germany
Vrijeme pridruživanja: kolovoz 2011.

Tweetovi

Blokirali ste korisnika/cu @sculabs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sculabs

  1. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    29. sij

    1\ I've written a little compiler to ship ML models as standalone Yara rules, and done proof of concept detectors for Macho-O, RTF files, and powershell scripts. So far I have decision trees, random forests, and logistic regression (LR) working.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    25. sij

    I came to know that the 's hex editor is unbearable in the dark mode, so I fixed it. New release: 0.4.0.1 is out:

    Poništi
  4. proslijedio/la je Tweet

    Is malware going out of buissness? Our feeds show that the malware started removing itself from infected clients leaving this message

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet

    Adware is just malware with a legal department.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    16. sij
    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    16. sij

    CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    13. sij

    Shout-out to for making ! Working with this tool inspired me to write a quick tutorial on it: Anyone know of other good malcode extraction tools like hollows_hunter?

    Poništi
  10. proslijedio/la je Tweet
    10. sij

    I was able to reproduce the Citrix ADC Remote Command Execution in one day. Guess you need to patch ASAP. -2019-19781

    Poništi
  11. proslijedio/la je Tweet
    11. sij

    We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag.

    Poništi
  12. proslijedio/la je Tweet
    6. sij

    DM: You find a large beast Player: OH MY GOD CAN I TAME IT AND USE IT AS A MOUNT!? DM: ...you know what, go ahead and roll for it.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. proslijedio/la je Tweet
    6. sij

    🧠Research Brain-Dump🧠 Join us for a deep dive into the how’s and why’s of automated malware unpacking. In this video we discuss how we built UnpacMe!

    Poništi
  15. proslijedio/la je Tweet
    3. sij

    🚀 Launch Day 🚀 It’s official this project that and I have been a part of for 5 years is now available as a free public Beta! Automated malware unpacking!

    Poništi
  16. proslijedio/la je Tweet
    2. sij
    Poništi
  17. proslijedio/la je Tweet
    2. sij

    a nice talk from , about using PE relocations for the purpose of obfuscation: Nick Cano - "Relocation Bonus - Attacking the Windows Loader Makes Analysts Switch Careers" :

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    30. pro 2019.
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    21. pro 2019.

    Peep this work I've been doing for the last 6 months. I' sure there are errors, but it's at the point where I think it's ready for the world. Enjoy my work on

    Poništi
  20. proslijedio/la je Tweet
    19. pro 2019.

    We are releasing a free decryption tool for the (a GarrantyDecrypt/Outsider variant). Detailed instructions are available on our blog: Special thanks to for collaboration

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·