Andreas Klopsch

375 posts

Andreas Klopsch

Andreas Klopsch

@hackingump1

Reverse Engineer @ Microsoft (MIRAGE)

Katılım Ocak 2020
274 Takip Edilen878 Takipçiler
Andreas Klopsch
Andreas Klopsch@hackingump1·
🚨 RIFT Update 🚨 Improved rustc compiler detection ✅ Fixed bugs causing incorrect FLIRT signatures for nightly builds 🛠️ Plus, multiple stability fixes! We’re making RIFT easier to use—big features coming soon 😎 👉 github.com/microsoft/RIFT #RIFT #rust #microsoft #infosec
English
0
0
3
110
Andreas Klopsch retweetledi
vx-underground
vx-underground@vxunderground·
Lots of frustration in the malware analysis and reverse engineering community. It's been discovered a DEFCON talk, presentation, and the code which coincided with it, was AI slop. The talk itself had hallucinated terminology which (apparently) no one at DEFCON noticed. Bad.
vx-underground tweet media
English
73
166
3.3K
154.8K
Andreas Klopsch retweetledi
Ramin Nafisi
Ramin Nafisi@MalwareRE·
#PipeMagic is a highly modular backdoor used by the financially motivated threat actor Storm-2460. It masquerades as a legitimate open-source ChatGPT Desktop Application. Microsoft Threat Intelligence encountered PipeMagic as part of research on an attack chain involving the exploitation of CVE-2025-29824, an elevation of privilege vulnerability in Windows Common Log File System (CLFS). PipeMagic is a sophisticated malware framework designed for flexibility and persistence. Quality blog by MSTIC malware intelligence, research and analysis (MIRAGE) team: microsoft.com/en-us/security… #pipemagic #mstic #mirage #threatintelligence
Ramin Nafisi tweet media
English
0
16
56
22.3K
Andreas Klopsch retweetledi
Ramin Nafisi
Ramin Nafisi@MalwareRE·
Do you find analyzing Rust binaries/malware tedious and unpleasant? You’re not alone! If you’re attending #REcon this year, our own @hackingump1 will be unveiling #RIFT today at 2PM EST (not at REcon? We got you covered, stay tuned). We have been using RIFT internally for some time and it has truly transformed the way we handle and analyze Rust binaries. cfp.recon.cx/recon-2025/tal… #RIFT #Rust #REon25 #MSTIC #MIRAGE
Andreas Klopsch@hackingump1

Presenting "Unveiling RIFT: Advanced Pattern Matching for Rust Libraries" at RECON Montreal 2025! Sharing research on discovering Rust dependencies in compiled binaries. See you there! 🚀 #RECON2025 #RustLang #ReverseEngineering

English
0
14
37
22.7K
Andreas Klopsch retweetledi
herrcore
herrcore@herrcore·
Unpacking VMProtect 3 (x64) 🤷‍♂️
English
6
172
783
57.1K
Andreas Klopsch
Andreas Klopsch@hackingump1·
Presenting "Unveiling RIFT: Advanced Pattern Matching for Rust Libraries" at RECON Montreal 2025! Sharing research on discovering Rust dependencies in compiled binaries. See you there! 🚀 #RECON2025 #RustLang #ReverseEngineering
English
0
3
10
5.2K
Andreas Klopsch
Andreas Klopsch@hackingump1·
@gavzik This was a repost from 2020, so I don't have the code anymore unfortunately!
English
0
0
0
6
Murad
Murad@gavzik·
@hackingump1 Hi I am interested to get your python source code to decrypt PebbleDash TLS traffic
English
1
0
0
16
Andreas Klopsch retweetledi