sean

@seanmw

- Researcher - Reverse Engineer - Programmer - Fly Fisher - tweets are my own -

In a river
Vrijeme pridruživanja: svibanj 2008.

Tweetovi

Blokirali ste korisnika/cu @seanmw

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @seanmw

  1. proslijedio/la je Tweet
    2. velj

    Looking for some security R&D folks to help build cool stuff and solve interesting/challenging problems. Also need UI/UX engineers with security interests. Remote anywhere (almost), full time.

    Poništi
  2. proslijedio/la je Tweet
    27. sij

    📺 New Tutorial Video 📺 Learn how to automaticaly decrypt strings with and python 🐍 The 4th part in our reverse engineering deep-dive series. 👾🔍

    Poništi
  3. proslijedio/la je Tweet
    17. sij

    Here’s an IDAPython script that I have been using to populate comments and enum constants for Windows Crypto API. I still need to figure out how to search by constants by name, populate enums with multiple values and add more APIs but it’s still useful.

    Poništi
  4. proslijedio/la je Tweet
    6. sij

    🧠Research Brain-Dump🧠 Join us for a deep dive into the how’s and why’s of automated malware unpacking. In this video we discuss how we built UnpacMe!

    Poništi
  5. proslijedio/la je Tweet
    3. sij

    🚀 Launch Day 🚀 It’s official this project that and I have been a part of for 5 years is now available as a free public Beta! Automated malware unpacking!

    Poništi
  6. proslijedio/la je Tweet
    3. sij

    🥂 Public Beta Is Open 🥂 It’s 2020 and we are live! No more registration codes! Come sign up and start unpacking!! This is still in beta so submissions may be limited and things will break. Let us know if you encounter any issues 📟

    Poništi
  7. proslijedio/la je Tweet
    30. pro 2019.

    Some IoCs and intel on a actor I've been tracking:

    Poništi
  8. 30. pro 2019.

    Does anyone know of or have a set of VB6 samples? They don’t need to be labelled or exclusively packed malware

    Poništi
  9. proslijedio/la je Tweet
    20. pro 2019.

    Yay, today we finally passed 50%! Many thanks to the more than 50 people who contributed so far and helped enriching references with more meta data! If you want to support us, please consider filling out a couple of these forms ➡️

    Poništi
  10. proslijedio/la je Tweet
    14. pro 2019.

    Big thanks to for creating our first library! Now you can easily integrate our automated unpacking API into your local tools 💪

    Poništi
  11. proslijedio/la je Tweet
    9. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    3. pro 2019.

    0.55 is finally out, just in time for ! Main changes: olevba += SLK file parser and XLM macro extraction, VBA stomping detection More info: How to install/update: pip install -U oletools

    Poništi
  13. proslijedio/la je Tweet
    1. pro 2019.

    📺 New Tutorial Video 📺 Intro to scripting with Python and 🐍 Learn how to automate resolving the dynamic API calls ⚙️

    Poništi
  14. proslijedio/la je Tweet
    9. stu 2019.

    Very pleased to release the dates of our 12th edition! will take place on the 1st and 2nd of October 2020, training will be between the 28th and 30th September and Spring Training will be between the 22nd and 24th of April. Mark your calendars !!

    Poništi
  15. proslijedio/la je Tweet

    CrowdStrike Intelligence analyzed variants of Ryuk (a family distributed by WIZARD SPIDER) with new functionality for identifying & encrypting files on hosts in a local area network (LAN). Learn more

    Poništi
  16. proslijedio/la je Tweet
    21. lis 2019.

    Hey, folks, if you want to skip the registrations line tomorrow, you can come now to the entrance booth!

    Poništi
  17. proslijedio/la je Tweet
    20. lis 2019.

    📺 New Tutorial Video 📺 Step-by-step reverse engineering ransomware with . What to do once you have unpacked the malware 👨‍🏫

    Poništi
  18. proslijedio/la je Tweet
    18. lis 2019.

    One of the nicest venues I’ve had the pleasure of speaking at... about to kick off! Hope to see y’all at my talk: 1:50 in main theater track.

    Poništi
  19. proslijedio/la je Tweet
    16. lis 2019.

    Added process memory "tampering" to my taskmanager spreadsheet :-)

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    11. lis 2019.

    Hey / if you missed our malware triage workshop you can still snag a workbook and the lab material ... two left! Slide in my DMs or swing by the Novotel bar and say hi 🤓

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·