clibm079

504 posts

clibm079 banner
clibm079

clibm079

@clibm079

Independent Malware Analyst & Researcher,Notes (Philosophy & Poetry) — The Path of Clarity & Poems of Malware Analysis. Blog: https://t.co/DJ3Wxn2OWS

China Katılım Nisan 2021
851 Takip Edilen637 Takipçiler
clibm079 retweetledi
allthingsida
allthingsida@allthingsida·
idacpp 0.0.2 [github.com/allthingsida/i…] now supports 'plugins' that allow the c++ interpreter to come preloaded for certain header files or c++ libraries. For now, you can configure it to work with github.com/19h/idax out of the box.
allthingsida tweet media
English
0
8
66
3.9K
clibm079 retweetledi
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
Before dropping my next article (ERS_08), I’ve updated the ERS 06 article (rev C.1): exploitreversing.com/2026/02/11/exp… This revision features a refined ALPC exploit with a new stage and an extended cleaner stage, ensuring a stable exit and preventing system crashes. I’ve also fixed several minor issues and uploaded a new video demonstrating the practical execution. Enjoy the read and have an excellent day! #vulnerability #exploitation #cybersecurity #windows #exploit
Alexandre Borges tweet media
English
0
43
136
5.7K
clibm079 retweetledi
mthcht
mthcht@mthcht2·
👁️ LOLC2 Collection of C2 frameworks abusing legitimate services to evade detection Major update: new projects tested, enriched data, and deeper insights. site: lolc2.github.io github: github.com/lolc2/lolc2.gi…
English
0
88
287
26.1K
clibm079
clibm079@clibm079·
Returning to ancient philosophy—know yourself. AI is one such way to help us understand ourselves; it has helped me too much during my learning process. For example, it helps me understand how I think, what I haven't thought of, my observation methods, my thought processes....
English
0
0
0
79
clibm079
clibm079@clibm079·
AI is on fire, but I use it to accelerate learning while prioritizing building my own expertise, judgment, and understanding first — it also helps me sharpen my cognitive abilities.
English
2
0
7
1.2K
clibm079
clibm079@clibm079·
@hasherezade In addition, I don't rely on any one AI; I might try to compare the responses of different AIs, which will give me different insights.
English
0
0
1
64
hasherezade
hasherezade@hasherezade·
@clibm079 IMO the best use of AI is if you treat it as your personal coach and a sparing partner who can challenge your views and help you uncover blind spots you wouldn’t notice yourself.
English
3
0
11
1.1K
clibm079
clibm079@clibm079·
@hasherezade I sometimes use it for data analysis. It provides me with structured observations, which are very comprehensive. Sometimes, it even helps me discover new ways of observing things that I hadn't thought of before. It's fantastic.
English
0
0
1
73
clibm079
clibm079@clibm079·
@hasherezade Yes, it can also help us better observe ourselves and the world in a structured way, including the blind spots you mentioned, our own perceptions, and how we see problems, etc., which is very helpful.
English
0
0
1
88
clibm079
clibm079@clibm079·
Understanding malware analysis and its challenges Discover what to expect in a malware analyst career, from the types of malware you'll encounter to important tools to use to difficulties that arise for those new to the field. techtarget.com/searchsecurity… via @techtargetnews
English
0
1
1
182
clibm079 retweetledi
vx-underground
vx-underground@vxunderground·
If you want to learn malware development you need to do two things 1. Learn to code without the assistance of an LLM 2. Learn malware techniques, tactics, and procedures (TTPs). It doesn't really matter which one you start with. When I first started, I started with #2. I wasn't particularly interested in learning to program, but the theory and underlying concepts fascinated me. If you choose #2 you don't have to get super low level and start studying Windows internals (in this context I'm discussing Windows malware). You just need to know how a particular method works fundamentally. I think malware TTPs are really cool and I loved learning about them (I still do). What you'll eventually discover however is that TTPs "stack". You'll see newer techniques are based off of older techniques or they're slightly modified variants of older techniques. You'll also see some of the TTPs are completely legitimate things which are abused. You don't need a fancy course to study malware TTPs. You can just Google it or ask an LLM, or something.
English
33
154
1.7K
64.8K
clibm079 retweetledi
ESET Research
ESET Research@ESETresearch·
#ESETresearch analyzed more than 80 EDR killers, seen across real-world intrusions, and used ESET telemetry to document how these tools operate, who uses them, and how they evolve beyond simple driver abuse. welivesecurity.com/en/eset-resear… 1/6
English
4
76
256
28.4K
clibm079 retweetledi
Virus Bulletin
Virus Bulletin@virusbtn·
Trend Micro reveals that the Warlock ransomware group has enhanced its attack chain, including improved methods for persistence, lateral movement and evasion using an expanded toolset: TightVNC Yuze & a persistent BYOVD technique leveraging the NSec driver trendmicro.com/en_us/research…
Virus Bulletin tweet media
English
0
7
36
2K
clibm079
clibm079@clibm079·
@bluegatar @hasherezade Thank you, I use it to capture API sequences and get the "first view" to learn about thinking and design; I'm still studying... 💙
English
0
0
0
70
bluegatar
bluegatar@bluegatar·
@hasherezade @clibm079 Pin 适合: - 需要指令级精度的深度分析 - 分析有反调试/反Hook的恶意样本 - 学术研究、Fuzzing、符号执行 - 分析壳、shellcode、自修改代码 不适合: - 日常逆向分析 - 快速了解程序行为 - GUI 程序(太慢) - 需要实时交互的场景
中文
1
0
0
120
clibm079
clibm079@clibm079·
Manual DLL debugging takes time. My "first view" approach: 1. DLL → EXE 2. TinyTracer to capture API behavior Quickly reason about malicious actions before deep analysis. #dll_to_exe #TinyTracer #BareTail
clibm079 tweet media
English
2
10
97
7.2K
clibm079
clibm079@clibm079·
@hasherezade It works very well with DLL; you think a lot. Amazing job!💙
English
0
0
2
212
clibm079
clibm079@clibm079·
@hasherezade Thank you! happy for learning new things again!🌹
English
0
0
2
333