Xanderux

360 posts

Xanderux

Xanderux

@Xanderuxsf5

Threat intelligence analyst | #infosec Cyber threat intel community: https://t.co/5u7OdssOHI lolweb maintainer : https://t.co/sPciJFVGcN

Katılım Şubat 2016
532 Takip Edilen217 Takipçiler
Sabitlenmiş Tweet
Xanderux
Xanderux@Xanderuxsf5·
Hi all! The Threat intel discord server is still open to newcomers. The goal is to share information and methodology in this domain (malware analysis, IOC, leaked evidences, ...) Feel free to join, we are tens of members! discord.gg/KJaQwByvyR #cyberthreatintel #threatintel
English
1
1
2
0
Xanderux
Xanderux@Xanderuxsf5·
@n4itr0_07 What tool is it ? Do no seems to be fofa/censys/shodan or onyphe
English
1
0
1
55
N4!TR0 07
N4!TR0 07@n4itr0_07·
app="ClawDBot"
N4!TR0 07 tweet media
English
1
1
12
1.2K
Xanderux
Xanderux@Xanderuxsf5·
What's currently happening in tech? It feels like every cybersecurity startup is suddenly opening new roles after years of hiring freezes
English
0
0
0
55
Xanderux
Xanderux@Xanderuxsf5·
@FIRSTdotOrg Any timeline on the agenda release for the 2026 Paris Technical Colloquium?
English
0
0
0
16
Xanderux
Xanderux@Xanderuxsf5·
@cyb3rops Worth noting: many VirusTotal AV engines share the same underlying engine (e.g. Bitdefender rebrands). A single Bitdefender detection can trigger multiple VT hits. Same goes for false positives 🙃
English
0
0
1
285
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
What frequently happens when people read threat reports is 1. they notice the IOCs 2. go to Virustotal and check if their org's AV covers the threat But they shouldn't stop there. They should click on "Security vendor's analysis on: ..." 3. select the earliest date 4. check if their vendor detected the threat when it was first uploaded to VT (>= when it was seen in the wild) This sub menu is often ignored but it can tell you a lot about the AVs ability to spot new threats
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
English
5
45
299
27.9K
Xanderux
Xanderux@Xanderuxsf5·
@vxunderground I've built an RSS feed bot for my CTI community based on GitHub Actions. It's fully serverless, meaning it leverages GitHub's servers rather than requiring you to deploy and maintain your own infrastructure Check it out here: github.com/Xanderux/RssDi…
English
1
0
1
96
vx-underground
vx-underground@vxunderground·
Our "Cyber Threat Intelligence" Discord is temporarily down. If any of you recall, I made a simple bot which collected news from various RSS feeds and pushed it to a Discord server for people to watch. Unfortunately, this bot was being hosted on critical infrastructure (a Raspberry Pi) which was housed in Europe. This in of itself isn't a problem, except the person who was housing it for me messed up his immigration paperwork and got (temporarily) deported. It turns out if you're a United States citizen, temporarily residing somewhere in Europe, and you make a small oopsie on paperwork they kick you out the country for 90 days, but let you return after and stay for a few years (???). I don't understand immigration. I'm not educated in immigration law. His papers and reasoning for residing in Europe are completely legitimate. Barring them for 90 days because of a simple mistake but allowing them to return confuses my little brain. Anyway, they kicked him out for 90 days. All his stuff is still there. Our critical infrastructure is in his apartment. Once he is allowed to return it will come back online. Chat, we've been DEPORTED.
vx-underground tweet media
English
31
28
884
36.5K
Xanderux
Xanderux@Xanderuxsf5·
@JulienLevrard It would be great if we could work together to integrate #C2Watcher on your side. @OVHcloud support is efficient, but opening a ticket every time feels a bit too manual and tiring
English
0
0
0
42
vx-underground
vx-underground@vxunderground·
Giveaway. Thank you @mrd0x for sponsoring this. We've got FIVE @MalDevAcademy vouchers. These vouchers are bundles. This vouchers give you: - Full access to malware source code database - Full access to malware development course Comment below for a chance to win.
English
904
62
734
49.3K
Berk Albayrak
Berk Albayrak@brkalbyrk7·
Hi everyone 👋🏻, I’m excited to share that I’ve joined Trendyol Group’s Cyber Defence Center as a Security Engineer, focusing on threat intelligence and malware analysis 🥳🧡 I’m also truly excited to work with such an amazing team. On to the next chapter.
English
3
0
50
4.3K
Xanderux
Xanderux@Xanderuxsf5·
@brkalbyrk7 Thanks for sharing, @brkalbyrk7! It would have been great to see some performance stats for the different rule sets you mentioned
English
0
0
1
132
Berk Albayrak
Berk Albayrak@brkalbyrk7·
Back to blogging! 🎉 I just published a new article on how to build a clean, fast and reliable #YARA rule repository. Why it is hard: • 300K+ public rules • no global standard • high f/p rates, duplicate rules • performance/optimization issues 🔗 brkalbyrk.github.io/posts/Creating…
English
1
18
65
7.6K
Xanderux
Xanderux@Xanderuxsf5·
@olesovhcom could you please NUKE the following server which appears to be hosting malicious content and violates OVH ToS?
English
1
0
0
60
Tib3rius
Tib3rius@0xTib3rius·
Not encountered this issue myself, just checked by trying to access some known CloudFlare-protected sites in Burp and everything worked. But seems like some have run into this problem, so this extension seems like a good fix if you do!
Alp@alp0x01

Cloudflare has started blocking proxy tools like Burp Suite. If you encounter this error, download the “Bypass Bot Detection” extension from the BApp Store in Burp Suite. It should resolve the issue for Burp Suite.

English
20
7
105
16.3K
motuariki
motuariki@motuariki_·
@Xanderuxsf5 I can see how the wording as an Amos variant (which is how I view Odyssey) is confusing. I have updated notes to say it's simply Odyssey.
English
1
0
1
52
Xanderux
Xanderux@Xanderuxsf5·
@MalGamy12 Thanks for sharing, @MalGamy12. Pretty surprising to see they're still using the same certificate as a year ago
English
0
0
1
45