d35ha

28 posts

d35ha banner
d35ha

d35ha

@d35hax

Reverse Engineer - Flare, @Google

Dubai, United Arab Emirates Katılım Mayıs 2019
313 Takip Edilen822 Takipçiler
d35ha retweetledi
Josh Stroschein | The Cyber Yeti
🎙️ The next episode of Behind the Binary is here! In this episode we wrap up FLARE-On 12. We chat with several challenge authors (including the final challenge), discuss some creative cheating, and look at the impact of AI on the CtF 👇 open.spotify.com/episode/4jPPhf…
English
0
14
31
6.4K
d35ha retweetledi
Moritz
Moritz@m_r_tz·
One day to go! #flareon12 Here's a breakdown of the current registered users and challenge solve counts.
Moritz tweet media
English
0
5
21
3.4K
d35ha retweetledi
Google Cloud Security
Google Cloud Security@GoogleCloudSec·
FLARE-VM just got a serious upgrade — new GUI, automated builds, and 288+ tools (with better IDA + Go support). The latest update brings: 🧰 Revamped installer ⚙️ New Python script for full VM automation 📚 (cont) bit.ly/48VetqY
Google Cloud Security tweet media
English
0
111
404
70.8K
d35ha retweetledi
Mandiant (part of Google Cloud)
The 12th Annual Flare-On Challenge kicks off Sept 26 at 8PM EST! Reverse engineering pros, from Windows to Web3 (with a YARA twist), it's your time to shine. 🏆 Get ready → bit.ly/4ofb5g8 #FlareOn12
Mandiant (part of Google Cloud) tweet media
English
1
76
190
21K
d35ha retweetledi
Moritz
Moritz@m_r_tz·
Check out the new FLARE-powered podcast 🎧 "Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering." Available on Spotify open.spotify.com/show/3yWgmIuhW… and other podcast platforms. Hosted by @jstrosch
English
2
30
122
8.8K
d35ha retweetledi
Mandiant (part of Google Cloud)
The Flare-On Challenge is back for its 11th year! 🔥 This #CTF-style challenge for current and aspiring reverse engineers features puzzles across Windows, Linux, Web3, and even YARA. Learn more and get ready to compete → bit.ly/3TwZ7AG #Flareon11
Mandiant (part of Google Cloud) tweet media
English
4
78
195
22.7K
d35ha retweetledi
Moritz
Moritz@m_r_tz·
Over 3000 users registered for #flareon11 in the first five days. Join the fun at flare-on11.ctfd.io - there's 🐸
English
0
7
21
4.5K
d35ha
d35ha@d35hax·
@0xbahaa Congrates, keep going 🎉❤️❤️
English
1
0
2
0
Ahmad
Ahmad@0xbahaa·
I've just finished #flareon8, with slow and somewhat-steady progress. Much love and thanks to everyone involved 🌟. And just like #flareon7, I gained TONS of knowledge in many topics 🤓
Ahmad tweet media
English
8
2
33
0
d35ha
d35ha@d35hax·
Just decrypted the @elastic security EDR signature database [drive.google.com/file/d/1doTCZK…]; including ML models, detection rules, encoded lua scripts, yara rules, exception-lists and block-lists.
d35ha tweet media
English
19
216
679
0
Ahmad
Ahmad@0xbahaa·
@d35hax I'm sure that ur brain can decode and understand those complex expressions, my dear superhuman friend 👽.
English
1
0
2
0
d35ha
d35ha@d35hax·
The new version features the following: [+] Fully redesigned (more robust and clean code). [+] Symbols are resolved by hashes instead of names. [+] Support for symbols imported by ordinals. [+] Stealthy shellcode execution.
English
1
0
10
0
d35ha
d35ha@d35hax·
Recently, I've decided to refactor my old projects, here is the first one, CallObfuscator [github.com/d35ha/CallObfu…], it's an obfuscator used to hide (replace) the PE imports with other imports those are less suspicious (less chance to get flagged by analysts).
d35ha tweet media
English
2
77
254
0
d35ha retweetledi
Jonas L
Jonas L@jonasLyk·
Have a running exe delete itself while running
Jonas L tweet media
English
10
124
538
0