YouTube video by botconf eu
10 Years of Large-Scale Malware Comparison: Going Deeper With Machoke
I'm glad to share my talk at @botconf.infosec.exchange.ap.brid.gy 2025!
Do you want to know how we compare a sample with 150k others in seconds on @exalyze.bsky.social? This talk is made for you🚀
At the end, you'll get a hint on what's coming next for Exalyze 😉
youtube.com/watch?v=TS8X...
exalyze.io
23.07.2025 08:16 — 👍 4 🔁 3 💬 0 📌 0
I wanted to know how WMI Win32_OperatingSystem.Caption get the correct Version number (ex: "Microsoft Windows 11 Pro").
Turns out it's a DLL export: winbrand!BrandingLoadString.
And there is a patent for that : patentimages.storage.googleapis.com/94/ab/cb/7c1...
07.01.2025 17:19 — 👍 2 🔁 0 💬 0 📌 0
A companion blog to my Bluehat 2024 presentation on OleView.NET is up now. googleprojectzero.blogspot.com/2024/12/wind...
12.12.2024 23:32 — 👍 20 🔁 12 💬 0 📌 1
Perfctl malware exploiting exposed Portainer agent and using new SSH persistenceExaTrack
3+ YEARS of stealth! We uncovered new tactics used by the perfctl malware, including a userland rootkit & an SSH backdoor (a single SPACE in /etc/passwd!). More insights: blog.exatrack.com/Perfctl-usin... #cybersecurity #threat_hunting #linux #infosec #perfctl #rootkit #ssh #exatrack
17.12.2024 10:02 — 👍 10 🔁 6 💬 0 📌 0
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
Volatility Core developer, Dir. of Research Volexity, LSU Cyber
Artist, "Lourd est le Parpaing de la Réalité sur la Tartelette aux Fraises de nos Illusions"
Expérimentateur sans blouse blanche. Enquêteur sans moustache. Analyste sans PowerPoint. Vidéaste aussi.
VR team tech lead @synacktiv.com
Bellingcat is an independent investigative collective of researchers, investigators and citizen journalists brought together by a passion for open source research.
Want to support our charity? bellingcat.com/donate
wannabe hacker... he/him
🌱 grow your hacking skills https://hextree.io
hacker, poster, weird machine mechanic
https://chompie.rip
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
Founder of the PentHertz Company (@penthertz.bsky.social), specializing in networks and computer security engineer in #Wireless systems, #SDR, #Mobile, #CarHacking and #IoT
Company specializing in RF and Hardware security #cybersecurity #deeptech.
Reverse engineering, files formats and crypto.
https://github.com/lclevy
A geek. What else?
https://my.geekstory.net
Red Brain, Blue Fingers
Malware Analysis, Reverse Engineering, Threat Hunting, Detection Engineering, DFIR, Security Research, Programming, Curiosities, Software Archaeology, Puzzles, Bad dad jokes
https://www.hexacorn.com/blog/
hexacorn@infosec.exchange
Former RE team lead
@synacktiv - Former @AirbusSecLab lead
Collector of Quote
Security expert @Synacktiv
Security expert @Synacktiv