TrainSec Academy - Where pros train pros

501 posts

TrainSec Academy - Where pros train pros banner
TrainSec Academy - Where pros train pros

TrainSec Academy - Where pros train pros

@TrainSec

Learn Windows Internals, Malware Analysis, Malware Development, Hardware Hacking & Code Development from @UrielKosayev, @zodiacon & @The_H1tchH1ker

Katılım Ağustos 2023
84 Takip Edilen935 Takipçiler
TrainSec Academy - Where pros train pros retweetledi
Uriel Kosayev
Uriel Kosayev@UrielKosayev·
You can know how something works and still not understand it. I have seen analysts explain every function in a sample and still miss what actually matters. Because knowing is technical. Understanding is contextual. Malware analysis sits right in that gap. MAoS is not about knowing more. It is about understanding better. 📖 amazon.com/dp/B0FQDGZGZW If you feel that gap in your work, this is exactly where the book focuses. #MalwareAnalysis #ReverseEngineering #MAoS #CyberSecurity
Uriel Kosayev tweet media
English
1
5
19
564
TrainSec Academy - Where pros train pros retweetledi
Uriel Kosayev
Uriel Kosayev@UrielKosayev·
Some of the most effective malware I have seen was not sophisticated. No complex obfuscation. No advanced techniques. Nothing that would impress in a demo. What made it effective was how it was used. Malware does not operate in isolation. It operates inside decisions, timing, and context. If you only analyze code, you miss the operation. That is a big part of what MAoS tries to show. 📖 amazon.com/dp/B0FQDGZGZW If you have ever underestimated a simple sample, this will resonate. #MalwareAnalysis #ThreatResearch #MAoS #CyberSecurity
Uriel Kosayev tweet media
English
0
1
9
479
TrainSec Academy - Where pros train pros
If you want a clean Win32 exercise that’s practical and still relevant on modern Windows, this is a great one from @zodiacon. Control Panel is still supported, which means you can still build your own .cpl applets. This post shows the DLL approach in C++: implement CPlApplet, add resources (name/description/icon), install/register the applet, and debug it using the right host process. Read: trainsec.net/library/window…
English
0
5
21
1.7K
TrainSec Academy - Where pros train pros retweetledi
Uriel Kosayev
Uriel Kosayev@UrielKosayev·
MAoS was not written in isolation. It was written between real investigations, real deadlines, and real operational pressure. That influenced the tone of the book. I was not trying to create something flashy. I wanted to document a way of thinking that actually holds under pressure 🔥 If you work with malware in real environments, not just controlled labs, you will probably feel that difference. 📖 amazon.com/dp/B0FQDGZGZW If you are serious about sharpening how you think about malware, start here. #MalwareAnalysis #ThreatResearch #DFIR #MAoS #CyberSecurity
Uriel Kosayev tweet media
English
1
1
7
676
TrainSec Academy - Where pros train pros
Many developers and researchers view WinDbg as the tool of last resort. Something crashes, nothing else helps, and eventually someone opens WinDbg and starts digging. But that mindset misses the real power of the tool. WinDbg is not just a debugger used in emergencies. It is one of the most powerful research tools available for understanding how Windows actually works. Microsoft engineers use it to debug the operating system itself. With the right setup and workflow, it becomes a microscope for exploring Windows internals. On April 7th, 2026, @zodiacon will be running a LIVE 4-hour masterclass where he will use WinDbg specifically as a research platform for exploring Windows components. trainsec.net/windows-resear…
TrainSec Academy - Where pros train pros tweet media
English
3
9
43
3.3K
TrainSec Academy - Where pros train pros retweetledi
sam
sam@SamuelBeek·
Nobody: Absolutely nobody: Hardware people: lets get doom running on a pregnancy test
English
80
294
5.9K
426K
TrainSec Academy - Where pros train pros retweetledi
Uriel Kosayev
Uriel Kosayev@UrielKosayev·
I have written about bypass techniques before. They are interesting. They are clever. They are fun to analyze. But they age quickly. What stays relevant much longer is understanding patterns, constraints, and tradeoffs in how malware is written and operated. Techniques expire. Thinking compounds. That is why MAoS does not focus on trendy bypass tricks. It focuses on analytical maturity. 📖 amazon.com/dp/B0FQDGZGZW If you care about durable knowledge rather than temporary tricks, this book was built for that. #MalwareAnalysis #OffensiveSecurity #ThreatResearch #MAoS #CyberSecurity
Uriel Kosayev tweet media
English
4
26
184
8.7K
TrainSec Academy - Where pros train pros retweetledi
Uriel Kosayev
Uriel Kosayev@UrielKosayev·
When an attack bypasses an EDR, it is easy to blame the tool. But in most cases I have seen, the issue was not technical. It was assumptions. Assumptions about how attackers behave. Assumptions about what is normal. Assumptions about what should trigger Attackers do not just write code. They study defensive habits. That tension between offense and defense changes how you analyze malware ⚔️ That perspective influenced large parts of MAoS. 📖 amazon.com/dp/B0FQDGZGZW If you work in detection or incident response, this is a framework worth exploring. #DetectionEngineering #EDR #MalwareAnalysis #MAoS #CyberSecurity
Uriel Kosayev tweet media
English
1
7
51
2.1K
TrainSec Academy - Where pros train pros retweetledi
Uriel Kosayev
Uriel Kosayev@UrielKosayev·
The 17th edition of Warsaw IT Days is taking place online on March 19th and at the PGE National Stadium in Warsaw on March 20th, and I have the pleasure of participating as a speaker. In addition to my presentation, you can also enjoy over 300 lectures across 25 different thematic tracks. Join and hear about the latest trends and solutions in IT and data science, take advantage of the opportunity to deepen your technical knowledge, and exchange experiences with a community of over 10,000 industry specialists and managers. More information and registration at: warszawskiedniinformatyki.pl/en/
Uriel Kosayev tweet media
English
0
2
4
255
TrainSec Academy - Where pros train pros retweetledi
Uriel Kosayev
Uriel Kosayev@UrielKosayev·
Why EDR Failures Are Rarely Technical When an attack bypasses an EDR, it is easy to blame the tool. But in most cases I have seen, the issue was not technical. It was assumptions. Assumptions about how attackers behave. Assumptions about what is normal. Assumptions about what should trigger. Attackers do not just write code. They study defensive habits. That tension between offense and defense changes how you analyze malware ⚔️ That perspective influenced large parts of MAoS. 📖 amazon.com/dp/B0FQDGZGZW If you work in detection or incident response, this is a framework worth exploring. #DetectionEngineering #EDR #MalwareAnalysis #MAoS #CyberSecurity
Uriel Kosayev tweet media
English
0
4
10
862
TrainSec Academy - Where pros train pros retweetledi
Kevin Gosse
Kevin Gosse@KooKiz·
A lot of performance issues come from incorrect assumptions. ReSharper has a GetModuleReference method which iterates over the references of a project to find a specific module. The underlying storage is a list. It seems reasonable at first: how many references can there be in a typical project? 10? 20? Well, it turns out that a simple aspnetcore project, created with 'dotnet new webapi', has 309 references before even adding any external library! Because of this oversight, GetModuleReference was responsible for up to 4% of total CPU usage during Visual Studio startup in some of our performance tests. Replacing the storage with a map brought it down to 0.5%.
Kevin Gosse tweet mediaKevin Gosse tweet media
English
4
3
82
5.6K
TrainSec Academy - Where pros train pros retweetledi
Josh Stroschein | The Cyber Yeti
🎙️ In the latest episode ofBehind the Binary, Kevin Harris drops a hot take on the AI hype: 🔥 "There is no AI. We have not invented AI yet... it’s not demonstrating intelligence, it's reflecting your own back at you." One of the problem's this brings up is how the models are optimized - for plausibility and not truth. In this episode: ❌ Why replacing Tier 1 support with AI is a mistake. 📈 The "Sigmoid Curve" of AI growth. 🔓Fundamental security flaws in the Model Context Protocol (MCP). Listen to the full episode on Apple Podcasts 👇 podcasts.apple.com/us/podcast/ep2…
English
0
3
6
662