5hid

788 posts

5hid banner
5hid

5hid

@5hid_

Cyber Security & Malware Analysis enthusiast

เข้าร่วม Ocak 2014
2.7K กำลังติดตาม111 ผู้ติดตาม
5hid รีทวีตแล้ว
Reverse Engineering and More
Reverse Engineering and More@re_and_more·
RE tip of the day: To debug a DLL in IDA, set the path to the loader (for example, rundll32) in the Application field and the path to the DLL with the name of the export function in the Parameters field. Don't forget to set the breakpoints! #infosec #malware #reverseengineering
Reverse Engineering and More tweet media
English
0
22
208
12.9K
5hid รีทวีตแล้ว
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
NEW BLOG: The Great VM Escape 💕 We caught threat actors deploying a VMware ESXi exploit toolkit in the wild - potentially was a zero-day developed over a year before VMware's disclosure 👀 If anyone has thoughts on it let me know, but I needed almost a full case of beer to wrap my head around this one 🍺 Full technical breakdown 👇 huntress.com/blog/esxi-vm-e…
English
26
192
784
169.3K
5hid รีทวีตแล้ว
blackorbird
blackorbird@blackorbird·
The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World This book explores how intelligence and cyber-security analysts can uncover hidden links between threat actor infrastructure and ongoing investigations by pivoting on both classic and unconventional indicators — many of which are often overlooked. The material is grounded in empirical, field-tested strategies used in cyber-security, digital forensics, cyber threat intelligence, and intelligence analysis more broadly. Our goal is to provide analysts with a practical toolkit of analytical methods, supported by real-world examples, to enhance investigative workflows without locking them into a single mindset, strict model, or overly rigid technical strategy. Instead, the book encourages creative exploration, data-driven reasoning, and the use of diverse data points — from traditional IOCs to subtle metadata traces — as part of a flexible and repeatable analytical process. #threathunting github.com/blackorbird/AP…
blackorbird tweet mediablackorbird tweet mediablackorbird tweet media
English
3
126
599
37.7K
5hid รีทวีตแล้ว
vx-underground
vx-underground@vxunderground·
The entire AV, EDR, and SOC industry is a SCAM. Has your organization been a victim of ransomware? Start the computer in DEBUG MODE. DUH. Then simply delete the malware. It's as simple as that.
vx-underground tweet media
English
143
117
2.5K
143.5K
5hid รีทวีตแล้ว
vx-underground
vx-underground@vxunderground·
In a truly brilliant move, employees from DigitalMint and Sygnia, responsible for handling ransomware negotiations, were indicted for performing ransomware attacks under ALPHV ransomware group. - Kevin Tyler Martin, ransomware negotiator from DigitalMint - Ryan Clifford Goldberg, Digital Forensics and Incident Response manager from Sygnia - Unnamed co-conspirator-1 The motive, per court documents, were the individuals were motivated to "get out of debt". All 3 men began performing ransomware attacks in May, 2023 and continued performing ransomware attacks until on or around April, 2025. The attacks stopped when the United States Federal Bureau of Investigation approached Ryan Clifford Goldberg regarding the ransomware attacks. Unsurprisingly, Mr. Goldberg initially denied having any knowledge of the ransomware attacks. However, he cracked during the interview and placed the blame on the currently unnamed co-conspirator. He stated he was recruited by him. After the interview concluded, Mr. Goldberg and his wife purchased 1-way tickets to France (???). Unsurprisingly (again), he has been detained in France because he is not a citizen of France and France doesn't give a fuck about a non-citizen. Mr. Kevin Tyler Martin, currently residing in Texas, spoke in 2024 at a technology conference where he spoke about his experiences defending ransomware attacks and handling negotiations. Both Mr. Goldberg and Mr. Martin have been charged with: - Violation of the Hobbs Act (18 U.S.C. § 1951) x2 - Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030 (x1) Under max penalty of law, Mr. Goldberg and Mr. Martin could face as long as 50 years in prison.
English
15
44
303
41.3K
5hid รีทวีตแล้ว
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️ Meet Ryan Clifford Goldberg, a Digital Forensics and Incident Response manager at Sygnia, he is one of three insiders accused of cybercrimes. He allegedly conducted cyberattacks using ALPHV BlackCat ransomware. Goldberg and two other insiders ran ransomware operations since 2023 while employed at cybersecurity firms. After an FBI visit, Goldberg confessed. He now faces up to 50 years in prison.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
57
232
813
672.8K
5hid รีทวีตแล้ว
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
If you're wondering about the attack surface for @TwoSevenOneT's recent publications with PPL spawnage - I let AI write a hacky scanner to see which processes can be spawned as PPL process with a good list of results 🙂 gist.github.com/S3cur3Th1sSh1t…
S3cur3Th1sSh1t tweet media
English
3
53
228
34.5K
5hid รีทวีตแล้ว
pfiatde
pfiatde@pfiatde·
If you place a dll in a protected folder it will get executed? *mild shock* ... How can this get a CVE? This is a Proxy dll.
pfiatde tweet media
Cyber Security News@The_Cyber_News

🚨 Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Read more: cybersecuritynews.com/notepad-hijack… A newly discovered DLL hijacking vulnerability in Notepad++, the popular source code editor, could allow attackers to execute arbitrary code on a victim's machine. Tracked as CVE-2025-56383, the flaw exists in version 8.8.3 and potentially affects all installed versions of the software, putting millions of users at risk. The vulnerability enables a local attacker to achieve code execution by planting a malicious DLL file in a location where the application will load it. This type of attack undermines the integrity of the application and can be used to establish persistence or escalate privileges on a compromised system. #cybersecuritynews #vulnerability

English
19
65
611
61.4K
5hid รีทวีตแล้ว
Tijme Gommers
Tijme Gommers@tijme·
Exciting times. I'm publishing Dittobytes today after presenting it at @OrangeCon_nl ! Dittobytes is a true metamorphic cross-compiler aimed at evasion. Use Dittobytes to compile your malware. Each compilation produces unique, functional shellcode. github.com/tijme/dittobyt…
English
11
98
257
27.6K
5hid
5hid@5hid_·
Fighting malware to the death ⚔️ @MalFuzzer 's book is arrived!! 🔥
5hid tweet media
English
1
0
2
115
5hid รีทวีตแล้ว
ESET Research
ESET Research@ESETresearch·
#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6
ESET Research tweet media
English
57
665
2.7K
407.2K
5hid รีทวีตแล้ว
Phrack Zine
Phrack Zine@phrack·
Phrack turns 40. The digital drop is live. Download it. Archive it. Pass it on. 💾 phrack.org #phrackat40 #phrack72
Phrack Zine tweet media
English
7
263
719
66K
5hid
5hid@5hid_·
Dissect Packed Malware 101 What under the hood: - 🔬 The anatomy of packed malware; - ✅ Key indicators to identify packed samples; - 🔓 Step-by-step examples of manual unpacking; Read the full blog post here: shorturl.at/jgOWT #MalwareAnalysis #ReverseEngineering
5hid tweet media
English
0
0
0
35
vx-underground
vx-underground@vxunderground·
I was writing a "server side" polymorphic mutator for malware. The concept is generating a pseudo-random array of instructions then subsequently inserting the instructions programmatically into areas of the source solution during the compilation process. The final result post-compilation would be a completely "unique" malicious payload. The payload should function the same, but the mutator would introduce additional (and unnecessary) instructions which would frustrate malware reverse engineers (ideally, it would initially but they'd get over it). You can't strip the polymorphic* My solution was using D.H. Lehmer's 1948 "uniform" random number generator with a seed being the current tick count (64bit). Using a randomly generated number, a random number of structures would be allocated which house "random" arithmetic operations. Each "random" arithmetic operation would also be the result of the implementation described above. In other words, pseudo-random array of pseudo-random arithmetic operators on pseudo-random integers. Further complexity would be introduced by inserting conditional statements or loop constructs. Slipping this during the compilation process would be based on identification of ";"'s, and (trying) to intelligently identify "critical" locations where this sort of convolution would be of value. Anyway, I was locked in and working on it. Then my newborn son began screaming, shit his pants, and it exploded out his diaper. That was like, a week ago, or something. I haven't been able to return to the project since. He destroyed my will. Thanks for coming to my Ted Talk. Maybe someone here will do it
English
47
35
1K
67.4K
5hid รีทวีตแล้ว
vx-underground
vx-underground@vxunderground·
>make post >check comments >"remove the polymorphic" >"enter the code cave" >*cat picture* mfw
English
26
20
783
33.4K
5hid รีทวีตแล้ว
x64dbg
x64dbg@x64dbg·
We're excited to announce a major new release of x64dbg! The main new feature is support for bitfields, enums and anonymous types, which allows all types in the Windows SDK to be represented and displayed 🔥
English
12
261
1.4K
76.2K