malware Owl

317 posts

malware Owl banner
malware Owl

malware Owl

@malware_owl

Entering the world of Malware (◎▼◎) =========== Since August 2022. Opinions expressed are my own and not those of my employer

Katılım Eylül 2022
299 Takip Edilen366 Takipçiler
malware Owl
malware Owl@malware_owl·
@0x_Vivek @tom_doerr It does have a limitation which is that there can be tons of nodes which hangs the tab. To deal with that then, we will need to divide and conquer and deal with it without the visualizer tool XD
English
0
0
0
10
0x_Vivek
0x_Vivek@0x_Vivek·
@tom_doerr this looks insane actually. been spending way too much time staring at minified chunk files lately trying to figure out what they do. visual ast mapping is definitely the right approach here.
English
1
0
0
239
CyberDevHq (0xSEC)
CyberDevHq (0xSEC)@thecyberdevhq·
@malware_owl Always the first thought anytime the system faults. Either a potential vuln or something wrong somewhere.
English
1
0
1
153
malware Owl
malware Owl@malware_owl·
For many times now, laptop kept crashing (either security check error or heap based error) ... Thinking that there might be a vulnerability. E.g., Realtek driver based text in seemingly overflowed buffer, and many else. Was hopeful but it turns out it was likely a RAM bit-flipping hardware issue XD Here is one of the interesting ones (Bit flip, corrupting LIST_ENTRY when freeing kernel mem)
malware Owl tweet media
English
1
0
10
1.7K
malware Owl retweetledi
Tur.js
Tur.js@Tur24Tur·
save your exclude list in a file and use -O to load it. Most syscalls are noise (futex, ioctl, mmap) Filter them out and you only see file access + network the real RASP detection logic. frida-strace -D device -f App -O File.opts --limit 1000
English
0
2
17
1.4K
malware Owl retweetledi
秋风
秋风@q1uf3ng·
行了,别支支吾吾了,这道题的提问就到此为止吧。 你先停一下,看看你提交的这份 WriteUp。这份 exp 脚本写得非常漂亮,ROP 链构造得滴水不漏,连栈帧平衡都做得极其完美。但是,刚才我仅仅是让你解释一下这里为什么要用 pop rdi,你竟然连参数传递的基础调用约定都答不上来?还有前面那道 Web 题,你能构造出那么复杂的反序列化 POP 链,结果我问你魔术方法是怎么触发的,你支支吾吾半天,大脑一片空白? 大家都是搞技术的,别在这里自欺欺人了。你这两天的入队考核题,根本就没有经过你自己的大脑思考吧?全程都是把伪代码和题目描述喂给大模型,然后把生成的 payload 复制粘贴过来的,对不对? 你是不是觉得自己很聪明,以为在这个时代,能用大模型跑出 Flag 就可以拿来当敲门砖了?我告诉你,你这种态度,不仅是对面试的敷衍,更是对 CTF 这三个字的侮辱! 你认清现在的现实了吗? 你能做的那些常规题,AI 能做,而且几秒钟就能甩出完美的解答;你不能做的那些复杂逻辑和底层逆向,AI 照样能做! AI 知识库里装的那些冷门架构、底层协议、编译原理,你不会,你连听都没听过! 你现在唯一会的,就是把报错信息复制下来,粘贴给 AI,然后当一个没有任何感情、也没有任何思考的“大模型肉体搬运工”! 你连最基础的代码为什么能跑通都不知道,知其然而不知其所以然。遇到稍微变个种、加点 AI 没见过的混淆、或者断网打线下 AWD 的时候,你就是一个废人! 那么请问,那我到底要招你来干什么?! 我是要招一个能打硬仗、能和顶尖黑客拼思维博弈的网络安全研究员!如果只是为了让大模型做题,我不会自己写个 Python 脚本,拉个几百线程直接对接 API 自动化跑吗?脚本的响应速度比你快一万倍,还永远不会累,我为什么要浪费战队宝贵的工位和资源,去招一个只会按 Ctrl+C 和 Ctrl+V 的人?
中文
7
4
58
11.7K
malware Owl retweetledi
Hermes Tool
Hermes Tool@Hermes_tooll·
Coruna - iOS exploit kit - JavaScript. 28 modules, 500+ XOR strings decoded, 6,596-line teardown. PAC bypass, JIT cage escape, PACDB hash forgery. post first, technical analysis looks better on github, link on-site) github.com/Rat5ak/CORUNA_… github.com/Rat5ak/CORUNA_…
English
2
22
126
9.2K
malware Owl retweetledi
Om Patel
Om Patel@om_patel5·
claude code has a hidden setting that makes it 600x faster and almost nobody knows about it by default it uses text grep to find functions. it doesn't understand your code at all. that's why it takes 30-60 seconds and sometimes returns the wrong file there's a flag called ENABLE_LSP_TOOL that connects it to language servers. same tech that powers vscode's ctrl+click to jump straight to the definition after enabling it: > "add a stripe webhook to my payments page" - claude finds your existing payment logic in 50ms instead of grepping through hundreds of files > "fix the auth bug on my dashboard" - traces the actual call hierarchy instead of guessing which file handles auth > after every edit it auto-catches type errors immediately instead of you finding them 10 prompts later also saves tokens because claude stops wasting context searching for the wrong files 2 minute setup and it works for 11 languages
Om Patel tweet media
English
195
250
5.7K
830.3K
malware Owl retweetledi
Buzzer
Buzzer@buzz3r_·
I decided to try out agentic coding/reversing, so I’m releasing a project that assists with reverse engineering in both Binja and IDA Pro. It’s an agent, not an MCP, that support multiple providers, it has some interesting features such as code exploration github.com/buzzer-re/Riku…
English
3
40
202
16.2K
malware Owl retweetledi
matteyeux
matteyeux@matteyeux·
The repo I am sharing contains JS files, shellcode blobs and mach-o files containing the implants github.com/matteyeux/coru…
English
2
37
180
15.9K
malware Owl retweetledi
Bruce Dang
Bruce Dang@brucedang·
One of our engineers just did a detailed writeup for one of his Google kCTF kernel exploits. The bug is 20 years old and has been there since Linux 2.6.12! open.substack.com/pub/calif/p/a-…
English
1
79
368
17.6K
malware Owl retweetledi
CVE
CVE@CVEnew·
CVE-2026-3102 A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function SetMacOSTags of the file lib/Image/ExifTool/MacOS.pm of the component P… cve.org/CVERecord?id=C…
English
0
1
2
207
malware Owl retweetledi
malware Owl
malware Owl@malware_owl·
It’s been some time. This is interesting because I was thinking about an old n-day and began to wonder if there were other variants and sure enough, there is!
Kaspersky@kaspersky

Kaspersky GReAT researcher @malware_owl discovered CVE-2026-3102 — a command injection vulnerability in ExifTool (≤13.49) on macOS. A crafted image file with malicious metadata can trigger arbitrary code execution. Update to v13.50 now! #Kaspersky #GReAT #Cybersecurity #VulnerabilityResearch #OpenSource #InfoSec #macOS

English
0
3
17
1.7K