@Computeus7 Profile picture

Ahmet Payaslıoğlu

@Computeus7

Incident Responder | Threat Hunter

Joined August 2018
Similar User
batcain photo

@batcain_

PRODAFT photo

@PRODAFT

Ahmet Bilal Can 🦔 photo

@0xabc0

Furkan Öztürk photo

@furk4n0zturk

Ahmet GÜREL photo

@ahmettgurell

Dmitry Melikov photo

@DmitriyMelikov

anıl photo

@ccelikanil

Muhammet Gedik photo

@h4ck2s3c

Kağan IŞILDAK photo

@kaganisildak

Oktay photo

@oktayyilddiz

Furkan photo

@caliskanfurkan_

Fatih ERDOĞAN photo

@FeCassie

meto photo

@meto0x3d

Berk Albayrak photo

@brkalbyrk7

Hebun Kurt photo

@hebun_2107

Ahmet Payaslıoğlu Reposted

Hackers abuse Avast anti-rootkit driver to disable defenses - @billtoulas bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/…


Ahmet Payaslıoğlu Reposted

Blog Series: Anti-Forensics techniques on Windows, Linux & Azure💕 Bypassing Windows event logging via native APIs inversecos.com/2022/03/window… Detecting forged logs in Entra ID inversecos.com/2023/01/detect… Timestomping all registry key write times inversecos.com/2022/04/malici… Timestomping…

Tweet Image 1
Tweet Image 2

Ahmet Payaslıoğlu Reposted

orkl.eu has got a new cool UI

Tweet Image 1

Ahmet Payaslıoğlu Reposted

Ready for some Thanks Giving reading? Nighthawk 0.3.3 Evanesco is now live for customers nighthawkc2.io/evanesco/ #happythanksgiving

Tweet Image 1

Ahmet Payaslıoğlu Reposted

Hunting ClickFix Fake Captchas? 🕵️‍♂️ Use these TI Lookup queries in @anyrun_app to track recent submissions: 🔎 commandLine:"*captcha*" AND commandLine:"*mshta*" 🔎 commandLine:"*captcha*" AND commandLine:"*PowerShell*" Stay ahead of the game! 🚀 #ThreatIntelligence

Tweet Image 1
Tweet Image 2

Ahmet Payaslıoğlu Reposted

It is really interesting to find anti-VM techniques being used by threat actors in the wild. This is a PowerShell script protecting a #Lumma Stealer build and being spread on YouTube videos. In this case, this was enough to make @anyrun_app to fail based on Screen Resolution

Tweet Image 1
Tweet Image 2
Tweet Image 3

Ahmet Payaslıoğlu Reposted

~100 of new threat hunting content (ES|QL, Osquery) for windows, macos, cloud and more ... github.com/elastic/detect…

Tweet Image 1
Tweet Image 2

Threat hunting just got easier! This new repo of detection rules is crafted by our veteran detection engineers and powered by different Elastic query languages. Get the details of what’s included and see the future of this repo here: go.es.io/4h2JsTX #ElasticSecurityLabs



Ahmet Payaslıoğlu Reposted

Likely StealC URLs on UrlScan👀 These can be found by searching URLScan for pages containing an IP (no domain), and ending in a 16 character .php file. urlscan.io/search/#page.u…

Tweet Image 1
Tweet Image 2

Ahmet Payaslıoğlu Reposted

I created the first draft of a website for the EDR telemetry project to help people quickly compare vendor telemetry visibility. What do you think about it? Are there any specific features you want to see for the website? Built with ChatGPT 4o with canvas (wanted to test it…


Ahmet Payaslıoğlu Reposted

🧵1/ If you're like me, you get tired of fighting Windows...from a win box for #malware analysis, or preventing Windows from updating when you don't want it to. Enter Windows Firewall Control (binisoft.org/wfc)

Tweet Image 1

Ahmet Payaslıoğlu Reposted

I’m in love with RansomLook, created by @adulau and Fafner! ❤️ There are multiple resources related to ransomware activities, and there's even an API so you can integrate the data directly into your backend! 🔥 Check it out: ransomlook.io #ransomware #threatintel

Tweet Image 1
Tweet Image 2
Tweet Image 3

Ahmet Payaslıoğlu Reposted

See that ad for Slack? It's actually a malicious site that tricks Mac users into downloading an infostealer.

Tweet Image 1

Ahmet Payaslıoğlu Reposted

In one of the #MalwareAnalysis communities I’m in, we were talking about Go malware. Someone mentioned CAPA as a good tool. I have to say, it’s really helpful for finding the 50kb of interesting code buried inside a 5mb Go binary 😎What other tools do you use?

Tweet Image 1

Ahmet Payaslıoğlu Reposted

The DFIR Report's latest analysis focuses on an intrusion that started with the execution of a Cobalt Strike beacon and ended in the deployment of BlackSuit ransomware. thedfirreport.com/2024/08/26/bla…

Tweet Image 1

Ahmet Payaslıoğlu Reposted

We just released Hayabusa 2.17.0 and Takajo 2.6.0 at Taiwan's greatest security conference: HITCON! Hayabusa has support for the new Sigma V2 modifiers and many various enhancements. Takajo has a new HTML summary report feature! github.com/Yamato-Securit… github.com/Yamato-Securit…

Tweet Image 1
Tweet Image 2
Tweet Image 3

Ahmet Payaslıoğlu Reposted

Oh, so you track ransomware tools? OK, name every one. Me:

Tweet Image 1

Ahmet Payaslıoğlu Reposted

Updated List of 109 Domains Potentially Impersonating Crowdstrike🍿 (All registered in the last 7 days, some might be legitimate) areyouaffectedbycrowdstrike[.]info britishairways[.]crowdstrike[.]feedback crowdstrike-ab1[.]pages[.]dev crowdstrike-bsod[.]co…

Tweet Image 1

Adding a bunch more suspicious #crowdstrike domains registered in the last 7 days. crowdstrike-bsod[.]co crowdstrike-bsod[.]com crowdstrike-fix[.]zip crowdstrike-helpdesk[.]com crowdstrike-out[.]com crowdstrike[.]blue crowdstrike[.]bot crowdstrike[.]cam crowdstrike[.]ee…

Tweet Image 1


Ahmet Payaslıoğlu Reposted

Hello everyone, as promised, we are back with the first results of our investigation. any.run/cybersecurity-… In this report, we present the facts and timeline of the incident. We’ve also added our response actions. More updates will be provided later as we make further progress…


Ahmet Payaslıoğlu Reposted

New version of ReverserAI, shortly before our @reconmtl talk: * supports a second, more powerful local LLM * applies static analysis to enhance results of GPT-based function renaming * various minor improvements and bug fixes Plugin: github.com/mrphrazer/reve…


Loading...

Something went wrong.


Something went wrong.