Anuj Soni

752 posts

Anuj Soni

Anuj Soni

@asoni

Malware Reverse Engineer. Instructor & Author. Occasional YouTuber.

Washington, DC Katılım Kasım 2007
358 Takip Edilen3.4K Takipçiler
Anuj Soni
Anuj Soni@asoni·
@fr0gger_ Thanks for this detailed write-up, Thomas. And great job handling objections at the end :-)
English
1
0
3
162
Anuj Soni retweetledi
Kyle Cucci
Kyle Cucci@d4rksystem·
One issue with all this LLM reverse engineering hype is a misunderstanding what RE means. True RE delivers a complete understanding of malware and all its capabilities. Most of these LLM demos I’ve seen are just replicating what malware sandboxes have been doing for a decade.
English
7
16
119
10.1K
Anuj Soni
Anuj Soni@asoni·
Modern Windows malware is often obfuscated, and if automation falls short, a debugger could be the fastest way to uncover the underlying code. In my latest video, I use @x64dbg to deobfuscate and dump the payload of a multi-stage Windows malware sample. youtu.be/-lYiKq0t5sc
YouTube video
YouTube
Anuj Soni tweet media
English
2
4
14
1.2K
Anuj Soni
Anuj Soni@asoni·
Want to learn Windows malware analysis but not sure where to start? I organized my beginner videos into the ideal sequence: 1⃣ mindset/approach 2⃣ lab 3⃣ static analysis 4⃣ behavior analysis Every video has links to tools and samples so you can follow along. youtube.com/playlist?list=…
Anuj Soni tweet media
English
0
1
4
670
Anuj Soni
Anuj Soni@asoni·
Part 3 of my Malicious Shellcode Analysis series is live! 🔥 We kick off static analysis: pull strings, uncover hidden data, and use rule matching to ID malware families. New update to my malware analysis template too. 🎥 Watch: youtu.be/jQFKOXC_MaU
YouTube video
YouTube
Anuj Soni tweet media
English
1
15
80
4.5K
Anuj Soni
Anuj Soni@asoni·
Part 2 of my shellcode analysis series is here! This time, we’re automating shellcode extraction with one of @hasherezade’s incredible open-source tools. 🎥 Watch now: youtu.be/D6Bm5vD78eY
YouTube video
YouTube
Anuj Soni tweet media
English
4
33
133
15.5K
Nick Carr
Nick Carr@ItsReallyNick·
POV: what are you buying at these prices (in NJ?)
Nick Carr tweet media
English
20
0
13
11.6K
Anuj Soni
Anuj Soni@asoni·
Launching a series on malicious shellcode analysis! In Part 1, I share an approach to manually extract shellcode from multi-stage malware, with help from @x64dbg and @vector35's Binary Ninja. 👉 Watch now: youtu.be/642VUEjMeLw Part 2 will explore automating shellcode extraction (coming soon—subscribe so you don't miss it!).
YouTube video
YouTube
Anuj Soni tweet media
English
3
45
153
8.4K
Anuj Soni
Anuj Soni@asoni·
Super excited to dive into @vector35 training this week!
Anuj Soni tweet media
English
1
1
29
1.6K
Anuj Soni
Anuj Soni@asoni·
After far too long, I signed up to sponsor @x64dbg! If you benefit from x64dbg like I do, consider supporting this essential tool: github.com/sponsors/mrexo…. And if x64dbg isn’t in your toolkit, think about supporting the tools that are. Free tools may be 'free', but they’re costly in time and effort for the developers. Let’s support them so they can keep supporting us!
English
0
4
18
4.9K
Anuj Soni
Anuj Soni@asoni·
🚨 @UHC is hiring a Senior Malware Analyst! 🚨 If analyzing malware is your mission, apply now: careers.unitedhealthgroup.com/job/20783386/s… This is a remote role, but candidates must be located in the U.S. Not for you? Please retweet – this might be the opportunity one of your followers has been waiting for.
Anuj Soni tweet media
English
0
5
5
1.5K
Anuj Soni retweetledi
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤩 I’m honored to announce that I’ve been nominated for the @SANSInstitute Difference Maker award in the category "Practitioner of the Year"! 🎉 If you’ve liked my work, you can cast your vote here 👇Thanks a lot for your support! 🙏 ❤️ #infosec survey.sans.org/jfe/form/SV_e3…
Thomas Roccia 🤘 tweet media
English
15
15
115
9.9K
Anuj Soni retweetledi
Willi Ballenthin
Willi Ballenthin@williballenthin·
capa v7.3 out! Recently we’ve added: - Drakvuf and @vmray sandbox support - web interfaces for results, rules, and homepage - BinExport2 backend that enables aarch64 and Android analysis via Ghidra - …and of course lots of new rules github.com/mandiant/capa/…
English
1
38
111
9.9K