And #FlareOn12 Task 8: wp.me/p2mVNF-2Qf
27.11.2025 21:55 β π 8 π 2 π¬ 0 π 0@hasherezade.bsky.social
Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc) ; https://hasherezade.net
And #FlareOn12 Task 8: wp.me/p2mVNF-2Qf
27.11.2025 21:55 β π 8 π 2 π¬ 0 π 0And #FlareOn12 Task 8: wp.me/p2mVNF-2Qf
27.11.2025 21:55 β π 8 π 2 π¬ 0 π 0Long overdue, but hereβs my writeup for #FlareOn12 Task 9: hshrzd.wordpress.com/2025/11/20/f...
20.11.2025 05:28 β π 12 π 2 π¬ 1 π 0Heeey, ncurses/terminfo has a small virtual machine! And if there's a VM, there are CTF challenges :)
hackarcana.com/public-exerc...
hackarcana.com/public-exerc...
(third one coming next week, will be a bit harder)
The 13th annual @volatility #PluginContest is OPEN for submissions until 31 Dec 2025!
This contest is designed to encourage research & development in the field of #memoryanalysis. Every year, contributions from all around the world continue to help build the next generation of #memoryforensics.
-iOS 26 change deletes clues of old spyware infections
-Starlink disables 2.5k scam compound terminals
-Caribbean hospital still down 5 months after ransomware attack
-Poland charges officials in Pegasus scandal
Newsletter: news.risky.biz/risky-bullet...
Podcast: risky.biz/RBNEWS495/
Today I'm launching my new app, Hacktivate. It teaches real-world computer science skills through 240 "capture the flag" challenges, and works on iPhone, iPad, and Mac with one purchase. I've poured a ton of love into it, and I'd love to hear what you think π apps.apple.com/gb/app/hackt...
22.10.2025 13:20 β π 156 π 30 π¬ 18 π 0I used PE-bear for the first time to dump an embedded binary. Its intuitive UI made extraction effortless. Because malware often embeds payloads with the form A in B to evade detection, pulling out the inner binary was crucial for deeper analysis and IoCs hunting.
19.10.2025 08:45 β π 2 π 2 π¬ 2 π 0Finally done with #FlareOn12. What a ride! I am looking forward to read other peopleβs solutions, especially of those who did the 9th task quickly.
11.10.2025 16:26 β π 9 π 0 π¬ 0 π 0#FTSCon Speaker Spotlight: Aleksandra Doniec (@hasherezade.bsky.social) is presenting βUncovering Malware's Secrets with TinyTracerβ in the MAKER track.
See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...
My intermediate level malware analysis course is there.
60% off for the next two weeks.
malwareanalysis-for-hedgehogs.learnworlds.com/course/inter...
Beyond good olβ Run key, Part 148
www.hexacorn.com/blog/2025/07...
- option of custom parsing exports directory allows to pinpoint even the APIs that the malware author tried to hide by erasing exports table in memory: (github.com/hasherezade/...)
06.06.2025 19:18 β π 3 π 0 π¬ 0 π 0- watching not only the functions arguments, but also, how they changed after the function execution, and the function return value: (github.com/hasherezade/...) - thanks to a new contributor, maxspl:
06.06.2025 19:17 β π 3 π 0 π¬ 1 π 0includes: tracing defined local functions (github.com/hasherezade/...):
06.06.2025 19:15 β π 0 π 0 π¬ 1 π 0New #TinyTracer (v3.0) is out - with many cool features: github.com/hasherezade/... - check them out!
06.06.2025 19:11 β π 16 π 6 π¬ 1 π 01. Pause thread midway in exploit races (even βͺ).
2. Or block entire CPU core. Kernel APCs run at APC_LEVEL (π€―), so thread scheduling kinda disabled (think priority == β).
3. Or build upon @hasherezade.bsky.social work & generalize #WaitingThreadHijacking β making it, in fact, Waitless.
Screenshot of contextjail.exe running with default arguments. Highlighted: * prisoner thread (latched to CPU1 with priority 15) couldn't run for the entire test duration (30 seconds). * 99 jailer threads (latched to 6/8 processors, CPU2..CPU7) were using 20% of total CPU time. Overlay: pseudo-ASSCII art with prisoner thread and 6 jailer threads (guards), spamming NtGetContextThread to block the prisoner. Source and compiled binary: https://pastebin.com/pBJcGp1y
Heard of #ContextJail?
It's a nasty new technique: puts target thread into βͺ deadloop, for as long as you can afford. Requires THREAD_GET_CONTEXT right.
The gist? Just spam NtGetContextThread(tgt).πΈ
Target will be jailed, running nt!PspGetSetContextSpecialApc π.
Src & binary in [ALT].
Usecases: ‡οΈ
yes, we catch it, but I cannot speak for others
14.04.2025 18:59 β π 0 π 0 π¬ 0 π 0demo: www.youtube.com/watch?v=CZIR... ; src: github.com/hasherezade/...
14.04.2025 18:18 β π 5 π 0 π¬ 0 π 0My new blog for CPR: introducing Waiting Thread Hijacking - a remote process injection technique targeting waiting threads: research.checkpoint.com/2025/waiting... #ProcessInjection
14.04.2025 18:17 β π 15 π 10 π¬ 3 π 0π«
13.04.2025 21:57 β π 1 π 0 π¬ 0 π 0Zscaler has published a technical report on HijackLoader (IDAT Loader, GhostPulse) and its recent changes, such as its new call stack spoofing module, anti-VM module, and support for scheduled task persistence
www.zscaler.com/blogs/securi...
Abolish April Foolβs day. Society has moved past the need for April Foolβs day
01.04.2025 02:36 β π 13366 π 1549 π¬ 540 π 169KELA has published a profile on Rey and Pryx, the two main individuals behind the Hellcat hacking group, responsible for several breaches over the past months, such as Schneider Electric, TelefΓ³nica, and Orange Romania.
www.kelacyber.com/blog/hellcat...
We all knew this day would arrive when the DNA samples you willingly provided 23andMe would be up for sale. Company now says it's seeking a buyer as it files for bankruptcy. 23andMe says any buyer will have to adhere to privacy laws for customer DNA/data they acquire. people.com/23andme-file...
24.03.2025 16:58 β π 81 π 36 π¬ 6 π 9Clevo Boot Guard Keys Leaked in Update Package
www.binarly.io/blog/clevo-b...
Someone has done an excellent job collecting RATs and documenting them by version. They also included images.
A+ work. This is amazing (we're going to ingest this eventually)
github.com/Cryakl/Ultim...
A small demo/tutorial on unpacking executables with #PEsieve and #TinyTracer: hshrzd.wordpress.com/2025/03/22/u...
- automatic OEP finding, reconstructing IAT, avoiding antidebugs and fixing imports broken by shims
table of contents for tmp.0ut volume 4
Would you look at that, it's tmp.0ut Volume 4! Happy Friday, hope you enjoy this latest issue!
tmpout.sh/4/