Tyson Benson

2.5K posts

Tyson Benson banner
Tyson Benson

Tyson Benson

@tysonbenson

Patent Law → Product Cybersecurity | Suit Up & Hack 📺 | Malware Analysis • Exploit Dev • Windows Internals

Detroit, Michigan เข้าร่วม Eylül 2010
2K กำลังติดตาม1.7K ผู้ติดตาม
ทวีตที่ปักหมุด
Tyson Benson
Tyson Benson@tysonbenson·
Tyson Benson tweet media
ZXX
0
1
3
326
Tyson Benson รีทวีตแล้ว
Tyson Benson
Tyson Benson@tysonbenson·
I spent years as a Patent Attorney reading "The Code" (Law). Now I’m spending my mornings reading the actual code (Assembly). Why? Because you can’t regulate what you don’t understand. Compliance is the map. Offensive operations are the territory.
English
1
1
1
232
Tyson Benson รีทวีตแล้ว
Tyson Benson
Tyson Benson@tysonbenson·
Compliance is checking a box. Security is checking the execution path. I don't care if the library version is vulnerable. I care if the function is reachable. Built a prototype today to trace the "Red Line" of execution from the kernel handoff straight to the vulnerability. Proof of Reachability > CVSS Score
Tyson Benson tweet media
English
0
1
2
256
Tyson Benson รีทวีตแล้ว
Tyson Benson
Tyson Benson@tysonbenson·
Malware Unpacking 101: VirtualAlloc in Under 30 Seconds 💻 youtu.be/pLwnZ2lRX7c
YouTube video
YouTube
English
0
4
17
1.7K
Tyson Benson รีทวีตแล้ว
Tyson Benson
Tyson Benson@tysonbenson·
New Video! Part 1 of Build Your Own AI Agent: Static IoT Firmware Analysis with Python & LLMs! youtu.be/P6Izjw98vYc?si…
YouTube video
YouTube
English
0
5
33
6.5K
Tyson Benson รีทวีตแล้ว
Tyson Benson
Tyson Benson@tysonbenson·
Don’t let the name Love.exe fool you—there’s no love here, just a hidden crypto miner. 💔⛏️ I just performed a fresh analysis on a .NET dropper using AES encryption to hide its next stage. Here is the step-by-step breakdown of how it works: 👇
Tyson Benson tweet media
English
2
1
5
217
Tyson Benson รีทวีตแล้ว
Tyson Benson
Tyson Benson@tysonbenson·
Definitely check out if you want to dig into the basics of shellcoding! 👇
English
1
1
4
508
Tyson Benson รีทวีตแล้ว
Tyson Benson
Tyson Benson@tysonbenson·
You don't know " Stealth" until you try to hide from the Import Address Table (IAT). Moved from static API calls to dynamic resolution today. • No VirtualAlloc in imports. • No CreateThread in imports. • XOR encrypted payloads.
English
2
1
5
270
Tyson Benson รีทวีตแล้ว
Aaron Jornet
Aaron Jornet@RexorVc0·
🚨 Big news: New TH Book 🏹 After years in Threat Hunting, I wrote the book I always wanted when I started. The Art of Threat Hunting, practical, technical, no fluff. ⚡Hypothesis generation, queries & adaptation stuff, CTI-driven programs, documentation, team alignment. The full lifecycle. 🦖Full breakdown on the blog: rexorvc0.com 🔗Available on Amazon: amazon.com/Art-Threat-Hun… #ThreatHunting #BlueTeam #Cybersecurity #Research #CTI #Malware #threat
Aaron Jornet tweet media
English
11
69
318
17.3K
Tyson Benson รีทวีตแล้ว
Jeff McJunkin
Jeff McJunkin@jeffmcjunkin·
Imposter Syndrome is real, but you can take it multiple ways: 1) Out of any group, there is always something to learn 2) Out of any group, there is knowledge that only you have. Share it! Be excellent to each other, always be learning, and always share!
Jeff McJunkin tweet media
English
10
127
390
0
Tyson Benson รีทวีตแล้ว
wetw0rk
wetw0rk@wetw0rk7·
Oh you've compiled a kernel? Yeah, yeah, yeah but have you compiled a BROWSER. In this next video we continue the series of going through @ret2systems browser exploitation course. I would consider this another beginner friendly tutorial so don't be intimidated! Join me and check out the latest video below! youtu.be/f3okm258ZiE
YouTube video
YouTube
English
1
11
70
3.5K
Tyson Benson รีทวีตแล้ว
Bryson 🦄
Bryson 🦄@brysonbort·
Thread: How real adversaries are using C2 in 2026 (From building @scythe_io + watching nation-state/red team playbooks)  Spoiler: It's not just fancy Cobalt Strike beacons anymore. 🦄 1/10
English
4
42
186
20.5K
Tyson Benson รีทวีตแล้ว
wetw0rk
wetw0rk@wetw0rk7·
Interested in exploiting browsers? Join me as I go over the free section of @ret2wargames "Fundamentals of Browser Exploitation" course. This is a course delivered by real #Pwn2Own winners! So, you're learning from the best! This first video is very beginner friendly so check it out even if you're just curios🧐. Video link below: youtu.be/5ArMYqwCmD4
YouTube video
YouTube
English
1
37
215
11.9K
Tyson Benson รีทวีตแล้ว
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
A lot of malware analysts, myself included, are building something similar, so it’s amazing to see a Docker environment already bundled with the tools, MCP backend, and skills. Definitely gonna try this. Thanks for sharing!!
Tim Blazytko@mr_phrazer

New blog post: Building a Pipeline for Agentic Malware Analysis Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage Link: synthesis.to/2026/03/18/age… Github: github.com/mrphrazer/agen…

English
2
25
176
25.1K
Tyson Benson
Tyson Benson@tysonbenson·
@Steph3nSims Welcome these chances - strive to become an expert in the field(s). These are the times to differentiate yourself.
English
0
0
0
244
Tyson Benson รีทวีตแล้ว
Stephen Sims
Stephen Sims@Steph3nSims·
I want to share a quick thought for people in cyber security. This will be my longest tweet ever. I’ve spoken to many lately who are having an existential crisis from the constant posts about “the end of cybersecurity jobs.” Yes, things are changing quickly. This is a significant moment for the tech industry. Change can be uncomfortable. But we’ve seen cycles like this before. • When GitHub and open source took off, people said software engineers would disappear because code was free. • When AWS and cloud computing emerged, people said infrastructure jobs would vanish. • When fuzzing and SAST tools improved, people said vulnerability research would disappear. • Virtualization would eliminate infrastructure jobs. • Mobile computing was going to end desktop dev. • Exploit mitigations would end exploitability. It didn't. Each time automation improved, the amount of software grew faster than the automation. It does feel "different" this time as it's explosive. Some roles will shrink: • repetitive pentesting • basic vulnerability scanning • tier-1 SOC monitoring But other areas are expanding rapidly: • AI system security • supply chain security • identity architecture • autonomous agent security • critical infrastructure protection Historically, every time we eliminate one class of bugs, new classes emerge. Right now people are vibe-coding entire systems, giving AI access to their machines, crossing trust boundaries, and deploying autonomous agents with excessive permissions. The legal and regulatory world is nowhere close to ready. There will absolutely be new failure modes. Humans are amazing and always adapt, finding new ways to do things. The worst thing you can do right now is fall into a doom loop. ...and I’ll be honest, I too have felt the "psychological paralysis" a few times thinking, “Is this time different?” It's especially impactful when it comes from someone I respect in the community. There are certainly unknowns, in an industry where we've become accustomed to predictability. But... the majority of those reactions are usually driven by social media, not reality. Platforms like X reward engagement, and sensational doom posts spread faster than measured thinking. If you see something like: “Holy #$%^! Opus 66.6 just found every bug in Chrome and replaced 50 startups!” …mute it and move on. Instead: Stay curious. Learn the new technology. Adapt your skillsets. Build things. We’ll get through this transition the same way we always have. If I'm wrong then Sam Altman better be right about UBI! :) I'm sure that if this tweet gets any engagement that I'll get some heat for it, but a good friend of mine reminds me often to focus on what you have control over. I'll revisit this tweet at DEF CON 40!
English
55
310
1.5K
129.4K