Nietzsche Virus Lab

287 posts

Nietzsche Virus Lab banner
Nietzsche Virus Lab

Nietzsche Virus Lab

@NietzscheLab

macOS / linux malware research and red teaming stuff

Weimar, Germany Entrou em Mayıs 2024
649 Seguindo167 Seguidores
Nietzsche Virus Lab retweetou
@levelsio
@levelsio@levelsio·
Tmux is a terrible experience on a phone And a phone will be where we're coding at least half the time now Try pressing CTRL-B on a phone We need a new Tmux for modern times
Tommy Falkowski@TommyFalkowski

@SpaceMatthieu @levelsio muscle memory. ctrl-b w or ctrl-b n

English
51
7
135
37.1K
Nietzsche Virus Lab retweetou
cr0@Defensive-Security.com / EDRmetry / PurpleLabs
Focus on hands-on #linux offsec content modularity and, at the same time, multi-layered detection and forensics was the best decision I could have made with V2.0 Playbook. Directly to the point, without any frills! New updates coming soon 😎
cr0@Defensive-Security.com / EDRmetry / PurpleLabs tweet mediacr0@Defensive-Security.com / EDRmetry / PurpleLabs tweet media
English
0
5
13
2.3K
Nietzsche Virus Lab retweetou
vx-underground
vx-underground@vxunderground·
> check virustotal > uploaded 23 mins ago > AMOS stealer ah ok, so if you installed this skill it would just silently steal all your passwords and banking information and stuff. no big deal virustotal.com/gui/file/3c9dd…
English
10
17
605
20.2K
Nietzsche Virus Lab retweetou
Craig Rowland - Agentless Linux Security
I want to go over a basic use of static analysis of Linux malware using AI LLM tools. I'll use the classic BPFDoor fed into Claude Code with a simple prompt. This is done on an isolated VM using only static analysis command line tools. Let's go over this step by step in this thread.
Craig Rowland - Agentless Linux Security tweet media
English
4
10
75
4.7K
Nietzsche Virus Lab retweetou
Tomasz Łakomy
Tomasz Łakomy@tlakomy·
Claude is down
Tomasz Łakomy tweet media
English
86
631
11.3K
228.2K
Nietzsche Virus Lab retweetou
Jacob Gajek
Jacob Gajek@jgajek·
I think the best way to sum up the state of things is that manual reverse engineering doesn't make sense anymore. AI-assisted reversing is so much faster and easier that the old way of doing things is now obsolete. Full automation not there yet for heavily obfuscated samples.
Thomas Roccia 🤘@fr0gger_

x.com/i/article/2027…

English
3
1
20
6.9K
Nietzsche Virus Lab
Nietzsche Virus Lab@NietzscheLab·
note: binary wasn’t stripped, so symbols made it easy for AI still wild that i’m basically chatting with IDA Pro. next: trying a stripped/more advanced sample
English
0
0
0
67
Nietzsche Virus Lab
Nietzsche Virus Lab@NietzscheLab·
vibe-reverse-engineering a macOS malware > be me > open IDA > load sus macOS binary > remember i wired IDA via ida-pro-mcp to Github Copilot > ask Copilot “what does this do?” > full expert-level analysis appears from @claudeai Sonnet 4.6 > didn’t reverse > just chatted @code
Nietzsche Virus Lab tweet media
English
1
0
4
268
Nietzsche Virus Lab retweetou
allthingsida
allthingsida@allthingsida·
In this scenario, I was showing my non technical friend, with no IDA or RE knowledge, how we can just open Copilot CLI and have a chat with Notepad.exe . I started with the /idasql skill and asked it to load the binary in the background. I concluded the chat by asking about telemetry inside Notepad in Windows 11. It was a fun, casual and non technical chat with Notepad.
allthingsida tweet mediaallthingsida tweet mediaallthingsida tweet media
English
2
7
87
8.1K
Nietzsche Virus Lab
Nietzsche Virus Lab@NietzscheLab·
@txhaflaire yo, this was fast nice work. it works great, but the slider feels too small. it would be better under the process tree view (like spritetree). a fullscreen toggle for the process tree view (class="tree-wrap") would also help since large trees feel constrained right now.
English
0
0
1
26
Thijs Xhaflaire
Thijs Xhaflaire@txhaflaire·
Is ESLogger or Mac Monitor your friend for dynamic malware analysis on macOS? Then i've got something that might come to use! An browser based ES/Mac Monitor log analyzer with a lot of neat features like story timelines, Sigma rule matching, an in-depth process tree analyzer and much more and the neat thing is, nothing is uploaded to any backend! I'm looking for feedback! Take a look at es.decompiler.dev #macos #malware #reverseengineering #re #ThreatHunting #dfir
Thijs Xhaflaire tweet mediaThijs Xhaflaire tweet mediaThijs Xhaflaire tweet mediaThijs Xhaflaire tweet media
English
4
12
48
6.5K
Nietzsche Virus Lab retweetou
staysaasy
staysaasy@staysaasy·
My new favorite insult is calling someone’s job a Claude skill.
English
221
1K
14.4K
641.4K
Nietzsche Virus Lab retweetou
Nicolas Krassas
Nicolas Krassas@Dinosn·
High-performance secrets scanner. CLI, Go library, Burp Suite extension, and Chrome extension. 459 detection rules with live credential validation. github.com/praetorian-inc…
English
0
11
77
5.2K