Not completely but definitely considering it :-)
15.05.2025 12:32 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
YouTube video by Anuj Soni
Malware Analysis with capa & Binary Ninja Plugins (API Hashing)
New video is up! ๐ฅ
I show how to use Mandiantโs capa to quickly spot malware behaviorโthen dig deeper with Binary Ninja + HashDB to reveal hidden API calls (API hashing).
Watch here: youtu.be/FKv7njCmJMU
13.05.2025 11:03 โ ๐ 2 ๐ 1 ๐ฌ 1 ๐ 0
YouTube video by Anuj Soni
Shellcode Analysis: Extracting, Deobfuscating, and Matching Strings
Part 3 of my Malicious Shellcode Analysis series is live! ๐ฅ
We kick off static analysis: pull strings, uncover hidden data, and use rule matching to ID malware families.
New update to my malware analysis template too.
๐ฅ Watch: youtu.be/jQFKOXC_MaU
28.04.2025 14:19 โ ๐ 3 ๐ 0 ๐ฌ 0 ๐ 1
Romanian antihacker from another planet. #threatintel #yara #chess #taekwondo black belt
Motto: "One reboot a day keeps the implant away"
Principal Adversary Hunter @dragosinc, Army Veteran,
Cocktail Scientist, APT Researcher | #FSD
https://infosec.exchange/web/@DrunkBinary
https://twitter.com/DrunkBinary
Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc) ; https://hasherezade.net
โ Cybersecurity reporter
โ
Newsletters at Risky Business
#infosec #cybersecurity
https://risky.biz
malware detection and analysis, hunting and gathering, threat research
| CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | Only My Opinions :) |
Malware analysis can be hard, but learning it shouldnโt be.
https://training.invokere.com
The largest collection of malware source code, samples, and papers on the internet.
Password: infected
(unofficial, this is a bot! Maintained by @yjb.bsky.social, the bot can't handle retweets, video, and maybe a few other things)
@Straiker. Ex-Microsoft. Ex-Meta RedTeam, Ex-Endgame, Ex Fireeye. malwareunicorn.org
I am a nerd that started a company almost 15 years ago. Secure Ideas is a security consulting firm focused on helping clients have the best penetration testing experience. I am also an IANS faculty member and currently an OWASP global board member.
Hacker. Friend. Cybersecurity Researcher at Huntress.
Volatility Core developer, Dir. of Research Volexity, LSU Cyber
https://kostas.page | Opinions are mine only! ๐ฌ๐ท๐จ๐ฆ
Red Brain, Blue Fingers
Malware Analysis, Reverse Engineering, Threat Hunting, Detection Engineering, DFIR, Security Research, Programming, Curiosities, Software Archaeology, Puzzles, Bad dad jokes
https://www.hexacorn.com/blog/
hexacorn@infosec.exchange
Advances cybersecurity. Grows tech businesses. Fights malware.
CISO at Axonius. Faculty Fellow at SANS Institute. Creator of REMnux.
https://zeltser.com
official Bluesky account (check username๐)
Bugs, feature requests, feedback: support@bsky.app