@yossefzidann Profile picture

Joezid

@yossefzidann

Malware Analyst @EG_CERT

Joined August 2018
Similar User
Hagar Yousef photo

@alien0x_

Kareem Alsadeq photo

@AlsadeqKareem

Mohammed Hasan photo

@0xHasanM

Mohamed Sayed (ret2flex) 🇵🇸 photo

@FlEx0Geek

Ahmad photo

@0xbahaa

Mostafa-Abdelaziz photo

@0xMM0X

Mohamed Elawadly photo

@Elawadly77

Mohamed Serwah 🇵🇸 photo

@serWazito0

Yasser Ali photo

@n3r0li

Abd Elrhman Anter photo

@Anubi5x0

🇵🇸 1nclud3 🇵🇸 photo

@1nclud3

MUHAMMAD photo

@SN1PER47

Ahmed Fatouh photo

@XDev05

Mohamed AbuMuslim (أبومُسْلِم) photo

@m19o__

Abdalazez irsheidat photo

@irsheidat1

Joezid Reposted

We got 6th in #BHMEA23 CTF over the week. Didn't manage to get top 5 but it was a close battle! Big congrats to @dicegangctf for winning + @Blackhatmea for the nicely organised event. We will come back stronger next year!

ProjectSEKAIctf's tweet image. We got 6th in #BHMEA23 CTF over the week. Didn't manage to get top 5 but it was a close battle!

Big congrats to @dicegangctf for winning + @Blackhatmea for the nicely organised event. We will come back stronger next year!

Joezid Reposted

During the weekend, we participated in BRICS+ CTF Quals organized by C4T BUT S4D team and secured 1st place. As a reward, we also receive an invitation to compete in the 8th XCTF finals in China next year. We enjoyed the event and look forward to both upcoming finals!

ProjectSEKAIctf's tweet image. During the weekend, we participated in BRICS+ CTF Quals organized by C4T BUT S4D team and secured 1st place. As a reward, we also receive an invitation to compete in the 8th XCTF finals in China next year.

We enjoyed the event and look forward to both upcoming finals!

Joezid Reposted

Co-authoring Regexplore, a new @volatility 3 plugin, with ChatGPT😄 to bring Registry Explorer plugins' @EricRZimmerman tool to Volatility. 🛠️ Contribute and help improve its features!: github.com/0xHasanM/regex… 🔗 #Volatility #DigitalForensics #RegistryExplorer #ChatGPT

0xHasanM's tweet image. Co-authoring Regexplore, a new @volatility 3 plugin, with ChatGPT😄 to bring Registry Explorer plugins' @EricRZimmerman tool to Volatility.

🛠️ Contribute and help improve its features!: 
github.com/0xHasanM/regex… 🔗 

#Volatility #DigitalForensics #RegistryExplorer #ChatGPT
0xHasanM's tweet image. Co-authoring Regexplore, a new @volatility 3 plugin, with ChatGPT😄 to bring Registry Explorer plugins' @EricRZimmerman tool to Volatility.

🛠️ Contribute and help improve its features!: 
github.com/0xHasanM/regex… 🔗 

#Volatility #DigitalForensics #RegistryExplorer #ChatGPT

Joezid Reposted

Defeating #dotRunpeX — New #virtualized .NET injector abusing advanced techniques to deliver numerous malware families. CP<r> provides an in-depth analysis of this threat introducing several PoC techniques for reversing protected/virtualized #dotnet code. research.checkpoint.com/2023/dotrunpex…


Joezid Reposted

I've published 2 quick tutorials about writing #x64dbg scripts and plugins, hope you learn something new :) n1ght-w0lf.github.io/tutorials/writ… n1ght-w0lf.github.io/tutorials/writ…

_n1ghtw0lf's tweet image. I&apos;ve published 2 quick tutorials about writing #x64dbg scripts and plugins, hope you learn something new :)

n1ght-w0lf.github.io/tutorials/writ…

n1ght-w0lf.github.io/tutorials/writ…

Joezid Reposted

Hi,I just published a write-up about how I solved Leaker challenge from WiCSME CTF 2022 and How I got RCE on XSLeak challenge ( Unintended Solution ) omakmoh.github.io/xsleak-is-2-wa…


Joezid Reposted

Curious about C2 Development? Read my new blog post, where I showed how to implement External C2 like Cobalt Strike to let the operator operate through his custom communication channel. xret2pwn.github.io/Myths-About-Ex… Peace out! ✌ #Redteam #CyberSecurity

's tweet image. Curious about C2 Development? Read my new blog post, where I showed how to implement External C2 like Cobalt Strike to let the operator operate through his custom communication channel.
xret2pwn.github.io/Myths-About-Ex…
Peace out! ✌

#Redteam #CyberSecurity

Joezid Reposted

Hey everyone, I published a new blog about using #YARA for malware config extraction. I used #RedLine stealer for demonstration (extracting C2 and BotnetID). n1ght-w0lf.github.io/tutorials/yara…


Joezid Reposted

Here we go again! Will randomly choose at end of next Monday 6/6 one person to attend the @cyber5w #CCDFA certification course LIVE with me starting June 13th. #DFIR #C5W All I ask you is to Retweet/RT, not even a like or follow!!! academy.cyber5w.com/courses/ccdfa-…


Joezid Reposted

Thanks to @hackthebox_eu for the wonderful event, we managed to clear all challenges and stay in Top 5 :)

ProjectSEKAIctf's tweet image. Thanks to @hackthebox_eu for the wonderful event, we managed to clear all challenges and stay in Top 5 :)

Joezid Reposted

Two Parts of Access Token Manipulation, I just talked about How to steal token of another process, make token, revert token, and finally How to build a token vault to store your stolen tokens in memory. Part1 : xret2pwn.github.io/Access-Token-P… Peace out!✌️ #redteam


Joezid Reposted

Bypassing CrowdStrike, Microsoft Defender for Endpoint etc. for fun.. not profit vanmieghem.io/blueprint-for-…

_vivami's tweet image. Bypassing CrowdStrike, Microsoft Defender for Endpoint etc. for fun.. not profit vanmieghem.io/blueprint-for-…

Joezid Reposted

04 Windows Registry - DFIR | Digital Forensics & Incident Response الحلقة الرابعة من سلسلة التحقيق الجنائى الرقمى و الاستجابة للحوادث باللغة العربية. youtu.be/3SFNyFKKLCY #DFIR #dfirtip #امن_المعلومات


Joezid Reposted

We are back and bigger 🔥 Coming soon... #FSecCon #Fword


Joezid Reposted

Really cool tool and awesome README that discusses in detail how EDR works (kernel callbacks, ETW, userland hooking, etc.) and how it can be bypassed with a vulnerable driver. They also put defensive considerations at the bottom! github.com/wavestone-cdt/…


Joezid Reposted

It was a thrilling experience to participate as challenge creators in such an amazing event @athackcon #FwordFTW


Joezid Reposted

Write-ups for 3 challenges from @CSAW_NYUTandon finals were we able to get 1st place as #Fword 🥇 1. lnkd.in/d4hpue9Z 2. lnkd.in/dWS-vuYJ 3. lnkd.in/d9wmTNmJ #dfir #CyberSecurity #infosec

0xHasanM's tweet image. Write-ups for 3 challenges from @CSAW_NYUTandon finals were we able to get 1st place as #Fword 🥇
1. lnkd.in/d4hpue9Z
2. lnkd.in/dWS-vuYJ
3. lnkd.in/d9wmTNmJ

#dfir #CyberSecurity #infosec

Joezid Reposted

We got 1st Place in @CSAW_NYUTandon CTF MENA 2021 Finals 🥳 This could not be done without the huge effort by all members through the Qualification Round and the Final Round. Thank you @DeadSec @Heaven's Bird @team7even1 for the great competition. #Fword

FwordTeam's tweet image. We got 1st Place in @CSAW_NYUTandon CTF MENA 2021 Finals 🥳
This could not be done without the huge effort by all members through the Qualification Round and the Final Round.
Thank you @DeadSec @Heaven&apos;s Bird @team7even1 for the great competition. 
#Fword
FwordTeam's tweet image. We got 1st Place in @CSAW_NYUTandon CTF MENA 2021 Finals 🥳
This could not be done without the huge effort by all members through the Qualification Round and the Final Round.
Thank you @DeadSec @Heaven&apos;s Bird @team7even1 for the great competition. 
#Fword
FwordTeam's tweet image. We got 1st Place in @CSAW_NYUTandon CTF MENA 2021 Finals 🥳
This could not be done without the huge effort by all members through the Qualification Round and the Final Round.
Thank you @DeadSec @Heaven&apos;s Bird @team7even1 for the great competition. 
#Fword

Loading...

Something went wrong.


Something went wrong.