codeneverdies

198 posts

codeneverdies banner
codeneverdies

codeneverdies

@codeneverdies

There’s nothing new under the sun.

가입일 Mart 2025
236 팔로잉343 팔로워
codeneverdies 리트윗함
x86matthew
x86matthew@x86matthew·
i recently decided to revive my old nintendo 64 emulator project. the CPU and RSP co-processor are working quite nicely, but the software rasterizer is still a work-in-progress and is very far away from being "hardware-accurate" (lots of visual glitches for now 🥲)
English
2
11
105
9.9K
codeneverdies 리트윗함
GuidedHacking
GuidedHacking@GuidedHacking·
We are hiring reverse engineers & game hackers for content creation: - 5 Video Tutorial Creators - 15 Text Tutorial Writers - Full time official GH Editor 👉guidedhacking.com/hiring 5-40 hours per week, consistently Required: 2 years of game hacking or 4 years of RE that can be applied to game hacking. We are also hiring a full time editor, as in, we are a publisher, and we need an official editor to manage other writers, edit content & maintain our standards of quality across all our content.
GuidedHacking tweet media
English
0
5
43
4.7K
codeneverdies 리트윗함
𝙁 𝙀 𝙇 𝙄 𝙓 𝙈
Introducing Combat Theater, a malware technique emulator built for blue teams, detection engineers and security researchers to perform testing and detection validation quickly and easily. Check out the introduction blog to learn more! combat.theater/blogs/introduc…
English
13
69
280
55.6K
codeneverdies 리트윗함
GuidedHacking
GuidedHacking@GuidedHacking·
🤩 Deobfuscate Anti-Cheat With Symbolic Execution We use angr, SMT solvers, and compiler optimization logic to automatically reverse engineer and defeat complex, obfuscated security code used by anticheats. 👉 guidedhacking.com/threads/how-to…
English
0
6
59
3.9K
codeneverdies 리트윗함
serioton
serioton@seriotonctf·
small cheatsheet on how to abuse some windows privileges and built-in groups github.com/seriotonctf/Re…
English
0
40
211
10K
codeneverdies 리트윗함
Daax
Daax@daaximus·
I decided to commit another part to the Applied Reverse Engineering series with an article diving into rolling your own primitive tracer for discrete purposes; coupled with an analysis on outrunning integrity checks. revers.engineering/applied-re-cru…
English
6
31
190
8.3K
codeneverdies 리트윗함
vx-underground
vx-underground@vxunderground·
Mr. Titus Tech is correct. cpuid-dot-com is indeed delivering malware right now. As I began poking this with I stick I discovered this is not your typical run-of-the-mill malware. This malware is deeply trojanized, distributes from a compromised domain (cpuid-dot-com), performs file masquerading, is multi-staged, operates (almost) entirely in-memory, and uses some interesting methods to evade EDRs and/or AVs such as proxying NTDLL functionality from a .NET assembly. The C2 domain present in one of the binaries is a clear IoC. This is the same Threat Group who was masquerading FileZilla in early March, 2026. They've been busy.
vx-underground tweet media
Chris Titus Tech@christitustech

HWInfo and CPU-Z both compromised. Millions about to be PWNED! CPU Z: hybrid-analysis.com/sample/eff5ece… HW Monitor: hybrid-analysis.com/sample/4968501…

English
121
994
8K
1.6M
codeneverdies 리트윗함
Silky
Silky@S1lky_1337·
Just weaponized BlueHammer a bit further. It only works when a new Defender signature update is available. However, you can fake updates by reading existing mpasbase.vdm and mpasdlta.vdm and simply patch versioninfo ressource higher. This works greatly.
English
7
20
117
8.1K
codeneverdies 리트윗함
GuidedHacking
GuidedHacking@GuidedHacking·
Every week we release 3000 word essays on various topics on our website. You'll never know they exist if you don't have a subscription. 👉 guidedhacking.com/threads/proces…
GuidedHacking tweet media
English
0
2
21
1.7K
codeneverdies 리트윗함
GuidedHacking
GuidedHacking@GuidedHacking·
🎓 GH's Upcoming Devirtualization Course Get ready to master the art of reversing custom VMs and complex obfuscation. We are building the ultimate blueprint to teach you how to devirtualize any VM from the ground up. Coming in 2026. 👉 guidedhacking.com/forums/devirtu…
English
1
14
83
12.7K
codeneverdies 리트윗함
GuidedHacking
GuidedHacking@GuidedHacking·
🚨 How are the geniuses at @BackEngineerLab revolutionizing binary obfuscation with CodeDefender.io? Learn about the unique challenges & solutions in bin2bin, virtualization & anti-tamper. See CodeDefender in action with a demo at the end! 👉youtu.be/3LOGxOHfUHg
YouTube video
YouTube
GuidedHacking tweet media
English
0
3
10
1.8K
codeneverdies 리트윗함
0xor0ne
0xor0ne@0xor0ne·
#infosec related list of blog posts, write-ups, papers, and tools covering cybersecurity, reverse engineering, and exploitation. github.com/0xor0ne/awesom…
0xor0ne tweet media
English
3
102
490
19.9K
codeneverdies 리트윗함
Cyber Pastey
Cyber Pastey@ayo__laolu·
How are we even hearing about a breach from the breacher and not the breached? You'd be shocked to know that even the breached finds out they're breached online.
English
9
24
88
3.8K
codeneverdies 리트윗함
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
RCE in Ghidra: My fav bugs target security tools. In CVE-2026-4946, you can embed these into your binary, analyst loads binary, Ghidra auto-generates the comments, analyst clicks on it, command executes. Write-up: takeonme.org/cves/cve-2026-…
solst/ICE of Astarte tweet media
English
8
56
359
22.1K
codeneverdies 리트윗함
Pirat_Nation 🔴
Pirat_Nation 🔴@Pirat_Nation·
After 12+ years, the original Xbox One has been hacked via a hardware voltage glitching attack on its boot ROM. Security researcher Markus Gaasedelen presented the exploit at RE//verse 2026.
Pirat_Nation 🔴 tweet mediaPirat_Nation 🔴 tweet media
English
55
330
6.4K
262.9K
codeneverdies 리트윗함
Mr.Z
Mr.Z@zux0x3a·
I am releasing a new toolkit I built for IIS-based lateral movement and code execution within IIS worker pool process's memory. Phantom ASPX Loader & PhantomLink -- a two-part toolkit for reflectively loading native DLLs into IIS w3wp.exe worker processes via ASPX. github.com/zux0x3a/Phanto…
GIF
English
4
76
248
15.8K