x3ph

74 posts

x3ph

x3ph

@x3ph1

Hack and Hack again.. Won Top 3 in the HackTheBox ValentinesDay Tournament. Won Top 100 in the HacktheBox Cyber Apocalypse event.

Katılım Aralık 2019
284 Takip Edilen715 Takipçiler
vx-underground
vx-underground@vxunderground·
Big giveaway. - (x3) Certified Red Team Expert (CRTE) - (x3) Certified by Altered Security Red Team Professional for Azure (CARTP) - (x10) Malware Analysis for Hedgehogs Bundle CTRE and CARTP sponsored by @nikhil_mitt Malware Analysis sponsored by @struppigel Leave a comment below on what you'd like. Winners chosen in 24 hours.
vx-underground tweet media
English
1.7K
126
1.5K
111.6K
x3ph
x3ph@x3ph1·
@vxunderground An meowvil act indeed. How on earth are we supposed to defend against such a high-skill cattack? Our furwalls clearly aren’t enough. 😔
English
0
0
1
169
x3ph retweetledi
Jord
Jord@0xLegacyy·
gdbw v0.1.0 is released! 🥳 Currently working on the wiki to get everything documented, go try it out! github.com/iilegacyyii/gd…
English
1
22
46
7.6K
x3ph retweetledi
Jord
Jord@0xLegacyy·
gdbw v0.1.0 releasing tomorrow! 🐸 Still a lot to add but hoping to get it into user's hands sooner so that we can figure out pain points etc.
Jord tweet mediaJord tweet media
English
6
2
61
6.3K
x3ph retweetledi
Jord
Jord@0xLegacyy·
Excited to be teaching ARTOC @defcon this year! Focused on modern tradecraft, tooling development, and building real skills from preparation to execution of real-world adversary emulation engagements. #DEFCON #redteam
White Knight Labs@WKL_cyber

Suit Up. Hack Hard. WKL Training Drops at DEFCON 2025. We're bringing three hardcore training courses: 🔹 ARTOC 🔹 ODPC 🔹 ASCPC Lock in your spot 👉 training.defcon.org/collections/de… #DEFCON #CyberSecurity #Hacking

English
1
5
22
4.2K
Gi7w0rm
Gi7w0rm@Gi7w0rm·
Dear friends and followers! It is with immense pride and greatefulness that today I received an official @CISAgov challenge coin, accompanied by a personal letter from CISA 's director @CISAJen. I am very happy to see see my work appreciated in this way! #infosec #reward 1/6
Gi7w0rm tweet mediaGi7w0rm tweet media
English
58
29
553
96.7K
x3ph
x3ph@x3ph1·
@nosecurething Observed four hits so far, but different dir path. In the process of retrieving the file atm. Hashes were all the same. profile\AppData\Local\Installinipsk\avolkov.exe d75680a5fcfd6839d40e5b4e379726ec0c01278709265ace4f1ba7327886b41c
English
1
0
0
0
Matt Anderson
Matt Anderson@nosecurething·
New #batloader IOCs (first major change I have seen): externalchecksso[.]com Instead of "update.bat" , an exe in a new directory create the connections to the C2: ➡️%appdata%local\SetupProject1\avolkov.exe It is also checking for more AVs to kill now. Using a dll now too.
Matt Anderson tweet mediaMatt Anderson tweet mediaMatt Anderson tweet media
English
2
8
33
0
x3ph
x3ph@x3ph1·
@th3_protoCOL Any sandbox of the initial delivery mechanism that created this scheduled task? I am the threat actor may have taken a similar approach as to using an ISO to deliver the executable. Upon investigation, I did not see any signs of mounting of ISO or executable as of yet. 1/2
English
1
0
1
0
Ankit Anubhav
Ankit Anubhav@ankit_anubhav·
#Azorult RabbitHole Malspam ⬇️ ISO attachment ⬇️ VBS unzip ⬇️ PowerShell launch ⬇️ Binary to ASCII conversion ⬇️ Download fake png from opendir ⬇️ Compile payload on fly using aspdot_net ⬇️ Theft ⬇️ POST to C2 ⬇️ Persistence by moving file to startup bazaar.abuse.ch/sample/e93cc14…
Ankit Anubhav tweet mediaAnkit Anubhav tweet mediaAnkit Anubhav tweet mediaAnkit Anubhav tweet media
English
2
23
75
0
LetsDefend
LetsDefend@LetsDefendIO·
Linux Log parsing cheat sheet
LetsDefend tweet media
English
34
923
3.3K
0
Kostas
Kostas@Kostastsale·
I usually make short-form satirical videos for fun, but never share them with the world. This time tho, I thought I'd make one for the infosec community. Some might even find it educational 😅 If you're in #infosec and you feel a little down this week, this video is for you💙
English
159
1.1K
3.1K
0