@c0ner0ne Profile picture

h4x

@c0ner0ne

Guy from the late 70’s - former software cracker at CORE - nowadays fighting malware and still interested in breaking things

Joined March 2015
Similar User
Rolf photo

@Rolf_Govers

Isabella photo

@Isigrimm

Bug Digger photo

@digger_bug

SNACKINT photo

@snackintel

tadl photo

@_tadl_

Mark Bregman photo

@InfoSec_KB

Wouter Jansen photo

@www0ut

Lars Behrens photo

@larsbehrens

Beverley Bird photo

@bvrly03

sud0woodo photo

@sud0woodo

Benjamin Ben photo

@BarbarOfBulgar

Tim de Boer photo

@tim427net

h4x Reposted

#ESETresearch reveals the first Linux UEFI bootkit, Bootkitty. It disables kernel signature verification and preloads two ELFs unknown during our analysis. Also discovered, a possibly related unsigned LKM – both were uploaded to VT early this month. welivesecurity.com/en/eset-resear… 1/5


h4x Reposted

Yo !!! @drdre @SnoopDogg You Been JAQED !!


Compiled machine #htb

Tweet Image 1

h4x Reposted

Obligatory - we are hiring, come and hack the planet with us. check out our open roles at job-boards.eu.greenhouse.io/watchtowr

Tweet Image 1

Certified Machine #htb

Tweet Image 1

h4x Reposted

Exciting news! I’m starting X-Force’s new offensive research team (XOR) and hiring a security researcher. Want to work with researchers (like @FuzzySec and I) to find bugs, exploit popular targets, and share your work? Apply for this unique (remote) role 😊careers.ibm.com/job/21219320/s…


HTB - Rhome

Tweet Image 1

HTB - Pentest Notes

Tweet Image 1

HTB - Secure Signing

Tweet Image 1

Good!

Can someone verify if this is real? 👀 “Law enforcement has compromised the entire backend infrastructure of the Redline and Meta infostealers. All data has been seized and will be reviewed as part of an ongoing internationally coordinated investigation. For details (or…



h4x Reposted

new 2 part blogpost on the Lexmark WTM stuff is now live! haxx.in/posts/wtm-wtf/


h4x Reposted

Wrote a #KoiLoader config extractor, writes the decrypted KoiLoader payload to the specified outfile. Enjoy ~ github.com/YungBinary/Koi…

Tweet Image 1

h4x Reposted

Updated #Lumma stealer C2 extractor, see github.com/YungBinary/Lum…

Tweet Image 1

h4x Reposted

Bypassing EPPs... 20 years ago, by @jamierbutler, @thegrugq and Eugene. Good old phrack magazine. #redteam #maldev phrack.org/archives/issue…

Tweet Image 1

h4x Reposted

I made a writeup on HACK ME! reverse engineering challenge from ASCIS 2024. The chalenge features a VM that uses a struct to store registers/memory. This writeup also focuses on how to define custom structs with IDA. fazect.github.io/ascis2024-hack…


Loading...

Something went wrong.


Something went wrong.