Maik Morgenstern

1.3K posts

Maik Morgenstern banner
Maik Morgenstern

Maik Morgenstern

@TriggerMeHappy

Doing fun stuff at @reversinglabs now. Reverse Engineer. Former CTO @avtestorg

Germany 加入时间 Nisan 2009
950 关注734 粉丝
Maik Morgenstern
Maik Morgenstern@TriggerMeHappy·
@m_r_tz I just focused on the API call's and ignored most of the actual instructions. That worked surprisingly well
English
1
0
2
406
Moritz
Moritz@m_r_tz·
Here's how the obfuscation in #flareon12 challenge 7 looks like in source - all just junk code 🗑️
Moritz tweet mediaMoritz tweet mediaMoritz tweet media
English
5
8
116
9K
malware Owl
malware Owl@malware_owl·
Fingers crossed
malware Owl tweet media
English
2
1
5
366
hasherezade
hasherezade@hasherezade·
Finally done with #flareon12. The 9th task was quite a ride. I need some tips from those who did the whole thing in less than a week.
hasherezade tweet media
English
14
11
251
24.2K
Calle Svensson
Calle Svensson@ZetaTwo·
@TriggerMeHappy @vector35 @x64dbg I still use x64dbg for interactive debugging most of the time but I'm trying to use windbg and the built-in Binja debugger more but when it comes to static analysis I think Binja is king. The API is fantastic.
English
1
0
2
127
Calle Svensson
Calle Svensson@ZetaTwo·
In case you haven't tried it yet: Time-Travel Debugging + @vector35 Binary Ninja integration is such a ridiculously powerful reverse engineering method.
English
2
3
32
4.1K
krkn
krkn@0xB000DEAD·
Done with #FlareOn12 An improvement from last year, proud to be representing @HarfangLab. The maths in #9 really threw me (most people it seems) off. More malware like #7! Big thanks to @googlecloud, @Mandiant this competition is a great opportunity to improve every year.
krkn tweet media
English
2
0
34
2.8K
x86matthew
x86matthew@x86matthew·
finished for 2025! the final challenge was very painful but happy with the result overall 🙃 #flareon12
x86matthew tweet media
English
4
3
229
19.5K
Maik Morgenstern
Maik Morgenstern@TriggerMeHappy·
@malware_owl That's what I said as well, I was close to crying once I discovered another layer after having thought I am done 🤣
English
1
0
1
347
malware Owl
malware Owl@malware_owl·
Challenge 7 of #flareon12 has so many junks that I almost cried. Managed to write a deobfuscator for that. Time to solve it for real ...
malware Owl tweet mediamalware Owl tweet media
English
2
0
8
2K
Maik Morgenstern
Maik Morgenstern@TriggerMeHappy·
Challenge accepted. Challenge completed. 💪 #FlareOn12 The last one, #9 was brutal, but I made it — 30th out of 2,500+ players! Proud to have represented @ReversingLabs for the first time and placed it high on the scoreboard. Thanks @Mandiant & @googlecloud for Flare-On 12!
Maik Morgenstern tweet media
English
0
1
51
2.9K
Wane
Wane@willington1337·
I won Flare-On 12! Got 8th on total leaderboard. GG (btw, it's funny that message hasn't been updated to Flare-On 11 lol)
Wane tweet media
English
7
0
64
4.4K
Maik Morgenstern
Maik Morgenstern@TriggerMeHappy·
@junr0n Nice, grats! Still struggling with 9 and looking for the shortcut 😁
English
0
0
0
359
jro
jro@junr0n·
Finished #flareon12 in the top 10!
jro tweet media
English
4
0
131
8.1K
SuperFashi
SuperFashi@SuperFashi1·
this year's flare-on is actually chill, nothing too crazy. however, still got a technically unsolvable 6 😓
English
3
0
15
2.1K
Maik Morgenstern
Maik Morgenstern@TriggerMeHappy·
@m_r_tz Open the first four challenges for everyone now, and then open the rest at the scheduled start time =)
English
1
0
6
998
Moritz
Moritz@m_r_tz·
Timezones are hard, FLARE-On is harder! Apologies, challengers – #flareon12 had an unintentional early start. To keep things fair for everyone, we are pausing the competition. We're evaluating the situation and will provide an update around 10 AM ET.
English
1
13
35
11.2K
Maik Morgenstern 已转推
nickharbour
nickharbour@nickharbour·
#flareon12 is coming in hot and fast this year and will only run for 4 weeks this year instead of the usual 6. Don't miss it! flare-on.com
English
3
27
93
16.4K
𝕯𝖒𝖎𝖙𝖗𝖞 𝕾𝖒𝖎𝖑𝖞𝖆𝖓𝖊𝖙𝖘
Following the DOJ and Microsoft's seizure of approximately 2,300 malicious domains that formed the backbone of Lumma’s infrastructure, I checked Malware Intelligence for more domains and found 30,068 URLs in the past month.
𝕯𝖒𝖎𝖙𝖗𝖞 𝕾𝖒𝖎𝖑𝖞𝖆𝖓𝖊𝖙𝖘 tweet media
English
5
17
77
10.1K
Maik Morgenstern
Maik Morgenstern@TriggerMeHappy·
@cyb3rops Plus a huge clean file repo in the cloud to deal with all the false positives 😁
English
0
0
0
412
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Funny how many AI endpoint security startups reach out to get access to our YARA rule feed and detection logic All that machine learning magic - but somehow still need our handcrafted rules included
English
20
39
367
23.7K