Пятничный опрос.
Кто круче? 😎
Кто круче? 😎
Final Results
22%
Threat hunter
64%
Reverse engineer
13%
Forensic investigator
Likely Belarus-Nexus Threat Actor Delivers Downloader to Poland
https://dmpdump.github.io/posts/Belarus-nexus_Threat_Actor_Target_Poland/
https://dmpdump.github.io/posts/Belarus-nexus_Threat_Actor_Target_Poland/
dmpdump
Likely Belarus-Nexus Threat Actor Delivers Downloader to Poland
On June 30, 2025, a file named deklaracja.chm (“declaration.chm”) was uploaded to VirusTotal from Poland.
dynamic binary instrumentation, analysis, and patching framework
https://github.com/redthing1/w1tn3ss
https://github.com/redthing1/w1tn3ss
GitHub
GitHub - redthing1/w1tn3ss: dynamic binary instrumentation, analysis, and patching framework
dynamic binary instrumentation, analysis, and patching framework - redthing1/w1tn3ss
China Targets Country’s Own Telecommunications
(говорят это были учения)
https://0x0d4y.blog/telecommunications-supply-chain-china-nexus-threat-technical-analysis-of-veletrix-loaders-strategic-infrastructure-positioning/
(говорят это были учения)
https://0x0d4y.blog/telecommunications-supply-chain-china-nexus-threat-technical-analysis-of-veletrix-loaders-strategic-infrastructure-positioning/
0x0d4y Malware Research -
VELETRIX Loader Dissection: Kill Chain Analysis of China-Nexus Telecommunications Infrastructure Targeting - 0x0d4y Malware Research
In my work I had the opportunity to analyze a China-Nexus Threat Actor, called Earth Alux, and this research, which only covers the fundamental points of the Kill Chain and the analysis of some components of its Toolkit, was the starting point of a long process…
SharePoint Unknown CVE Unveiled: RCE via WebPart Properties Deserialization
https://blog.viettelcybersecurity.com/sharepoint_properties_deser/
https://blog.viettelcybersecurity.com/sharepoint_properties_deser/
Analyzing Signal and Telegram messages on iOS
https://8ksec.io/advanced-frida-usage-part-2-analyzing-signal-and-telegram-messages-on-ios/
https://8ksec.io/advanced-frida-usage-part-2-analyzing-signal-and-telegram-messages-on-ios/
Unchained Skies: A Deep Dive into Reverse Engineering and Exploitation of Drones
https://cfp.recon.cx/media/2023/submissions/HLHH89/resources/REcon_online_slides_mLUVm2u.pdf
https://cfp.recon.cx/media/2023/submissions/HLHH89/resources/REcon_online_slides_mLUVm2u.pdf
Я в своем познании настолько преисполнился, что я как будто бы уже сто триллионов миллиардов лет проживаю на триллионах и триллионах таких же планет, как эта Земля, мне этот мир абсолютно понятен, и я здесь ищу только одного - покоя, умиротворения и вот этой гармонии, от слияния с бесконечно вечным, от созерцания великого фрактального подобия и от вот этого замечательного всеединства существа, бесконечно вечного, куда ни посмотри, хоть вглубь - бесконечно малое, хоть ввысь - бесконечное большое, понимаешь?
Odyssey Infostealer Dropper - SwiftUI Reverse Engineering
https://www.youtube.com/watch?v=skOsJjff9eg
https://www.youtube.com/watch?v=skOsJjff9eg
YouTube
Odyssey Infostealer Dropper - SwiftUI Reverse Engineering
In this video, I cover a malicious SwiftUI application that was recently blogged about by Jamf. The use of SwiftUI acting as the dropper of this Odyssey variant infostealer is interesting so I will walk through Swift specific data structures and quirks to…
An integration for IDA and VS Code which connects both to easily execute and debug IDAPython noscripts.
https://github.com/ioncodes/idacode
https://github.com/ioncodes/idacode
GitHub
GitHub - ioncodes/idacode: An integration for IDA and VS Code which connects both to easily execute and debug IDAPython noscripts.
An integration for IDA and VS Code which connects both to easily execute and debug IDAPython noscripts. - ioncodes/idacode
Forwarded from novitoll_ch
I presented my experiments with LLM and Linux kernel development back in 2600 June.
Slides are available here.
Here is the
documentation on how to use different LLM Clients (Claude, Copilot etc.). Interesting.
https://lore.kernel.org/all/20250725175358.1989323-1-sashal@kernel.org/
Slides are available here.
Here is the
[RFC 0/2] Add AI coding assistant configuration to Linux kernel with addingdocumentation on how to use different LLM Clients (Claude, Copilot etc.). Interesting.
https://lore.kernel.org/all/20250725175358.1989323-1-sashal@kernel.org/
Google Docs
8_2025_Jul4_2600_AI_Agents_Linux_kernel
MCP AI agents for the Linux kernel development Sabyrzhan Tasbolatov
Reverse engineering a Lumma infection
https://labs.withsecure.com/publications/reverse-engineering-a-lumma-infection
https://labs.withsecure.com/publications/reverse-engineering-a-lumma-infection
Withsecure
Reverse engineering a Lumma infection
Lumma is an information stealer that the WithSecure Detection and Response Team (DRT) have encountered several times. It has seen wider use over the past couple of years, and makes for an interesting threat to monitor.
In this post we will focus on a Lumma…
In this post we will focus on a Lumma…