this is my short analysis of a little-known security feature built into Windows that inadvertently broke one of our authenticode signatures recently elastic.co/security-labs/…
Yesterday I had my first day at @_CPResearch_! It is truly a blessing to be able to work with a team of such talented reverse engineers and have the opportunity to do malware research full time 🙏
🚨 Official Statement from Guided Hacking Regarding Malicious Impersonation & Fraudulent DMCA Campaign 🚨
To our community, fellow content creators and platform partners:
We are issuing this statement to address a serious, ongoing problem: a malicious and fraudulent campaign by…
This is a ongoing problem effecting dozens of Youtubers.
Guided Hacking is NOT sending fraudulent copyright strikes.
Cybercriminals are doing this to try to ruin our reputation in the community by striking game hacking youtubers, while impersonating our business.
🚨 This is NOT our attorney - any DMCA takedowns being sent from this attorney is fraudulent.
These are being sent by mentally ill cybercriminals trying to hurt our reputation.
GH has been under constant 24/7 attack by thousands of cybercriminals for 10 years because we reject…
The code for this project is full of emojis, nopped implementations of stuff with the comment "in a real implementation...", the SAT solver just returned SAT, the anti-debug patcher just returned true without doing anything, all sorts of stuff.
We knew at the talk this was BS,…
The code for this project is full of emojis, nopped implementations of stuff with the comment "in a real implementation...", the SAT solver just returned SAT, the anti-debug patcher just returned true without doing anything, all sorts of stuff.
We knew at the talk this was BS,…
😎Proxy DLLs are used by malware devs, red teamers, game modders and even game hackers.
DLL proxying can be a form of evasion and code execution, but in terms of game modding, it's just a simple method to load mods without shipping an injector.
👉youtu.be/OcDc_gMALX0
As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aimed at people that newer touched drivers before and covers IOCTL codes, IRPs and some IDA shenanigans with unions.
eversinc33.com/posts/driver-r…
Enjoy :3
The Game Hacking Village at DEFCON has come and gone, and by all accounts it was a huge hit.
Thank you to @GameHackingGG for all their hard work making a fun and exciting new event and letting us be involved.
Want to volunteer next year?👇 gamehacking.gg
Some group, who is Scattered Spider, or Scattered Spider-adjacent, is going schizo right now online.
They're showing incredibly sensitive details from Burger King, Victoria Secret, Subaru, etc.
Can someone tell me what these screenshots mean? They're posting these too
An interesting discovery from Kaspersky: a new AV killer is leveraging the legitimate ThrottleStop.sys driver to take down security processes. Attackers used this technique, known as BYOVD, to disable defenses before deploying MedusaLocker ransomware.
securelist.com/av-killer-expl…
Not sure why but we have lots of new followers!
FFmpeg makes extensive use of hand-written assembly code for huge (10-50x) speed increases so we are providing assembly lessons to teach a new generation of assembly language programmers. Learn more here:
github.com/FFmpeg/asm-les…
🚨 New research alert
Check Point Research discovered a critical RCE vulnerability (CVE-2025-54136) in Cursor, a fast-growing AI-powered IDE.
The flaw allows persistent, silent code execution by modifying previously approved Model Context Protocol (MCP) configs.
🧵More below:
Yikes - a NVIDIA software vulnerability that allowed attackers to access, steal, or manipulate other customers' models and data on shared GPU infrastructure 👀
2 Followers 166 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/PXYxuvrAR9
514 Followers 1K FollowingMemes | Coffee | I apparently use Emacs now | CTF with Shellphish | Malware | All posts and thoughts are probably from Stack Overflow | Tick 196 enthusiast
2K Followers 506 FollowingProud dad and husband, reverse engineer, exploit developer, author of SANS SEC670, and SEC665. Windows kernel developer, Air Force
30K Followers 561 FollowingCyBeRsEcUrItY | Not afraid to put down with some THICC malware on disk | securing and breaking AI @PaloAltoNtwks | Ex @spacex
2K Followers 136 FollowingJust a guy who likes anime, fighting games, hypervisors and reverse engineering. Member of @the_secret_club. Do not DM me about game cheats.
4K Followers 33 FollowingI'm a security researcher who uses this platform to share my projects and research. Opinions are my own.
https://t.co/UiWgKq40sV
1K Followers 125 FollowingSecurity Professional and Researcher with over a decade of experience. I'm fairly low profile, but share useful info from time to time.
47K Followers 2K FollowingChief Technical Innovation Officer @crowdstrike. Windows Internals author and trainer. He/Him. RTs are not endorsements, opinions are my own.
7K Followers 77 FollowingProfessional redteamer and malware development enthusiast ! I will share some tips and experiences. Look at my work here : https://t.co/cxLBvW7pcI
No recent Favorites. New Favorites will appear here.