Gam4er

36 posts

Gam4er

Gam4er

@Gam4enko

ИБ, ИТ и котики

Moscow, Russia Beigetreten Eylül 2017
179 Folgt27 Follower
Gam4er
Gam4er@Gam4enko·
However, terminating the process isn't always convenient, especially if it's a critical system process that you don't want to disrupt. In the case of CLR code injection, a better approach is to load the malicious code into a new AppDomain and then unload that domain once it's done—leaving no lingering artifacts. This is how it's implemented in my code: github.com/gam4er/SneakyR… Process still running, but all artifacts disappeared
English
2
0
0
43
Rasta Mouse
Rasta Mouse@_RastaMouse·
I wonder how many CS user have never thought about this - when you use explicit injection with an rDLL, what happens to it once it's finished? Nothing. It sits in memory until the process is closed.
Rasta Mouse tweet media
English
8
17
162
17.5K
Gam4er
Gam4er@Gam4enko·
@ANDREW1ALBERTT He is wonderful, but IMHO, with this lovely color it is much better to be a British cat, than a puppy. Call him Barsik (popular cat name in Russia)
English
0
0
0
0
Gam4er
Gam4er@Gam4enko·
@MalwareJake Don't worry, they just want to eat them
English
0
0
0
0
Jake Williams
Jake Williams@MalwareJake·
Why TF would scientists do this in 2020? They've been frozen for tens of thousands of years. Waiting until 2021 wasn't going to change anything...
English
22
38
285
0
Gam4er
Gam4er@Gam4enko·
@divernix Когда мне Гугл предлагает подобную дичь, то я рефлексирую: а не свернул ли я где-то не туда?
Русский
1
0
0
0
Nikita Rudenko
Nikita Rudenko@divernix·
По-моему Google все:
Nikita Rudenko tweet media
Русский
1
0
2
0
Nikita Rudenko
Nikita Rudenko@divernix·
Однако после суток самоизоляции с Win 10, заявляю – на фоне снижения качества железа и софта от Apple, переход на ThinkPad неизбежен.
Русский
1
0
0
0
Gam4er
Gam4er@Gam4enko·
@jarnomn @gentilkiwi Mr Benjamin try to emphasize, that AV vendors sometimes can not detect/prevent the prosess of ectraction credentials, isn't it? Detecting just files are boring ;)
English
0
0
0
0
Vincent Yiu
Vincent Yiu@vysecurity·
Do people even use CACTUSTORCH? Wondering if it's worth releasing a new version, maybe not.
Vincent Yiu tweet media
English
10
0
20
0
Gam4er
Gam4er@Gam4enko·
@alukatsky Алексей, а что тогда делать, чтобы новые технологии применялись? Похоже (и к лучшему) тактика "напугать заказчика" не работает ;)
Русский
1
0
0
0
Alexey Lukatsky
Alexey Lukatsky@alukatsky·
Обратите внимание на то, какие технологии защиты чаще всего используют компании по всему миру. Эти и другие цифры в новом исследовании Cisco - cisco.com/c/en/us/produc… (скоро и на русском языке)
Alexey Lukatsky tweet media
Русский
1
3
11
0
Gam4er
Gam4er@Gam4enko·
@divernix Да лааааадно. Есть пруфы?
Русский
1
0
0
0
Nikita Rudenko
Nikita Rudenko@divernix·
В бортовом журнале Аэрофлота за октябрь-ноябрь рекламируют TOR Browser. Хм-м-м..
Русский
1
0
0
0
Gam4er
Gam4er@Gam4enko·
@LasVegasLocally Seems like a part of the Boring Company advertising campaign: 1) Run a lot of nasty insects to LV 2) Give couple flamethrower to good guys 3) Make a good fire show 4) Increase capitalization of the Boring Company five times как тебе такое @elonmusk ?
GIF
English
0
0
0
0
Las Vegas Locally 🌴
Las Vegas Locally 🌴@LasVegasLocally·
This is... interesting 😨
Paradise, NV 🇺🇸 English
462
2.5K
6.5K
0
Gam4er
Gam4er@Gam4enko·
@malwrhunterteam Pizdec (пиздец) that word is quite popular at all of exUSSR republics. Just because almost everything that happens in these areas is "пиздец" :) Other is quite similar like Georgian... youtu.be/DuZsfaJ46QI
YouTube video
YouTube
0
0
3
0
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
Anyone knows what language is this ransom note is, and what it says? 🤔
MalwareHunterTeam tweet media
English
43
40
121
0