LE BERRE Stéfan

763 posts

LE BERRE Stéfan

LE BERRE Stéfan

@Heurs

CEO/Co-Founder - @ExaTrack

Paris Katılım Eylül 2009
414 Takip Edilen1.9K Takipçiler
LE BERRE Stéfan retweetledi
Exalyze
Exalyze@Exalyze_io·
Exalyze 1.0 is out 🥳 What's new on it? - Analysis pipeline rebuild for transparent updates - Yara generation (opcodes) have been improved - Pivots added for IP/domains to @virustotal @shodanhq @censysio @onyphe @fofabot See you on exalyze.io
English
0
6
2
658
LE BERRE Stéfan retweetledi
ö
ö@r0keb·
Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. r0keb.github.io/posts/Windows-…
English
4
134
403
32.7K
LE BERRE Stéfan
LE BERRE Stéfan@Heurs·
🚀 Take your malware analysis skills to the next level with Exalyze Discover our unique capabilities to compare malware code with our entire database, identifying similar samples and uncovering hidden connections. 👉 exalyze.io @Exalyze_io
English
0
13
11
958
LE BERRE Stéfan retweetledi
Nathan Blondel
Nathan Blondel@slowerzs·
Think HVCI and kCET mean the end of kernel code execution? I wrote a blogpost exploring an alternative way to execute a kernel payload! :) blog.slowerzs.net/posts/keyjumpe…
English
4
118
280
41.1K
LE BERRE Stéfan retweetledi
herrcore
herrcore@herrcore·
Probably worth reposting this for the first day of #100DaysofYARA
English
3
88
419
54.7K
LE BERRE Stéfan retweetledi
The Brofessor
The Brofessor@Glacius_·
Hey :) If you missed your daily Frenglish dose, my talk about Octo at @virusbtn is now available on Youtube: youtube.com/watch?v=H8y9d_… Talked about malware, infrastructure, bulletproof hoster, and more. The full paper is also available in the description :) @teamcymru_S2
YouTube video
YouTube
English
0
14
30
3.3K
LE BERRE Stéfan retweetledi
Clement Rouault
Clement Rouault@hakril·
In our search for new forensic artifacts at @ExaTrack, we sometimes deep dive into Windows Internals. This one is about COM and interacting with remote objects using a custom python LRPC Client. STUBborn: Activate and call DCOM objects without proxy: blog.exatrack.com/STUBborn/
English
0
39
58
13.1K
LE BERRE Stéfan retweetledi
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
So far, I have written 706 pages to help the security community. My goal will be writing new articles of the Exploiting Reversing Series (ERS), which is focused on security research. However, I am planning to write one or two additional articles of my previous series MAS (Malware Analysis Series) to finish it off. 10. exploitreversing.com/2024/01/03/exp… 09. exploitreversing.com/2023/04/11/exp… 08. exploitreversing.com/2024/08/07/mal… 07. exploitreversing.com/2023/01/05/mal… 06. exploitreversing.com/2022/11/24/mal… 05. exploitreversing.com/2022/09/14/mal… 04. exploitreversing.com/2022/05/12/mal… 03. exploitreversing.com/2022/05/05/mal… 02. exploitreversing.com/2022/02/03/mal… 01. exploitreversing.com/2021/12/03/mal… #windows #idapro #kerneldrivers #kernel #infosec #reversing #malwareanalysis #vulnerability #securecode
Alexandre Borges tweet media
English
10
227
779
43.5K
LE BERRE Stéfan retweetledi
Can Bölük
Can Bölük@_can1357·
Excited to share my latest article: PgC - a novel approach to disable Patchguard during runtime using basic memory management principles. It has worked against every version of Patchguard for the last 7 years, without needing any updates! blog.can.ac/2024/06/28/pgc…
English
14
122
327
46.8K