๐Ÿ‡บ๐Ÿ‡ฆ Xorhex ๐Ÿ‡บ๐Ÿ‡ฆ's Avatar

๐Ÿ‡บ๐Ÿ‡ฆ Xorhex ๐Ÿ‡บ๐Ÿ‡ฆ

@xorhex

252
Followers
603
Following
125
Posts
11.11.2024
Joined
Posts Following

Latest posts by ๐Ÿ‡บ๐Ÿ‡ฆ Xorhex ๐Ÿ‡บ๐Ÿ‡ฆ @xorhex

Post image

๐Ÿ˜ฌ

09.03.2026 21:28 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Victor just released v1.14.0 - improvements in macho module, tighter code generation in the compiler and the new โ€œdepsโ€ command.

Congratulations to everyone involved!

github.com/VirusTotal/y...

06.03.2026 10:52 ๐Ÿ‘ 4 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
a man in a suit and tie stands in front of an amazon prime logo ALT: a man in a suit and tie stands in front of an amazon prime logo

We are still finalising the agenda and the updated website, so the #PIVOTcon26 lineup announcement will be made early next week.
#CTI #ThreatIntel #ThreatResearch
#StayTuned

06.03.2026 16:21 ๐Ÿ‘ 8 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

never ask a researcher for their config parser code because it's gonna be the most spaghetti thing you've ever seen

04.03.2026 10:29 ๐Ÿ‘ 3 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

yr + nushell, cause why not?

03.03.2026 23:50 ๐Ÿ‘ 4 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Reverse engineers often spend significant time deciphering third-party libraries within firmware. My talk, scheduled for Friday at 5 PM at Reverse, introduces SightHouse, an open-source initiative aimed at automatically identifying third-party functions to enhance analysis efficiency.

02.03.2026 15:20 ๐Ÿ‘ 4 ๐Ÿ” 4 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
RE//verse 2026 - Reverse Engineering Conference Join us March 5-7, 2026 in Orlando, FL. Premier reverse engineering, vulnerability research, and malware analysis conference with world-class trainings and talks.

@re-verse.io has lighting talks ๐Ÿค”

Wonder if I can dust the cobwebs off of this deob-CFF project and get it working prior to Saturday. Chances are low but going to try ๐Ÿ˜… re-verse.io

02.03.2026 05:21 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

PlugX is a long-running Remote Access Trojan (RAT) that has been consistently linked to multiple China-aligned threat actors and espionage operations worldwide.
Lab 52 | S2 Grupo
lab52.io/blog/plugx-m...

26.02.2026 13:33 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

#MustangPanda

26.02.2026 17:43 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
GitLab Threat Intelligence Team reveals North Korean tradecraft Gain threat intelligence about North Koreaโ€™s Contagious Interview and fake IT worker campaigns and learn how GitLab disrupted their operations.

Without exaggeration, one of the most epic DPRK reports ever about.gitlab.com/blog/gitlab-...

20.02.2026 00:15 ๐Ÿ‘ 32 ๐Ÿ” 13 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 2
Post image

RationalEdge's #REDS Platform now supports ๐ŸŽ Mach-O ๐Ÿ( #iOS + #macOS) and Universal (FAT) binary formats.

We now cover:
- #PE, #ELF, #MachO
- x86/64, ARM/AArch64, MIPS, PowerPC, RISC-V (32/64)

@rationaledge.bsky.social rationaledge.io
#ThreatResearch #ThreatIntel #CTI #Malware #OT #Embedded 1/3

19.02.2026 13:45 ๐Ÿ‘ 8 ๐Ÿ” 3 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 1
Preview
GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures to deploy NetSupport RAT, Stealc, and Sectop...

1/ Today, Insikt Group is publishing on GrayCharlie, a threat actor active since mid-2023 that overlaps with SmartApeSG. GrayCharlie compromises WordPress sites and turns them into malware delivery hubs: www.recordedfuture.com/research/gra...

18.02.2026 17:13 ๐Ÿ‘ 5 ๐Ÿ” 8 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Avalon Linux Bot Malware Analysis with IDA Pro (Stream - 05/02/2026)
Avalon Linux Bot Malware Analysis with IDA Pro (Stream - 05/02/2026) YouTube video by Invoke RE

We've uploaded our stream from last Thursday where we analyzed the Avalon Linux bot with IDA Pro. Throughout this stream we reversed its persistence, C2 functionality, encryption and command dispatcher. Enjoy! www.youtube.com/watch?v=IaWU...

13.02.2026 14:17 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Decrypted/decoded a payload/binary using the Transform API in #BinaryNinja, but need a place to put it: use this to save it to your current project:

current_project.create_file(decoded_bytes, name="extracted.bin", folder=None, description="Extracted from: <insert hash of current file>")

12.02.2026 23:28 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say Palo Alto Networks opted not to tie China to a global cyberespionage campaign the firm exposed last week over concerns that the cybersecurity company or its clients could face retaliation from Beijing...

Scoop: A report published last week outlined what Palo Alto researchers believed was a China-linked hacking campaign.

But after an intervention from execs, the report's language was changed to refer more vaguely to "a state-aligned group that operates out of Asia."
www.reuters.com/world/china/...

12.02.2026 18:25 ๐Ÿ‘ 40 ๐Ÿ” 27 ๐Ÿ’ฌ 4 ๐Ÿ“Œ 6
BinYars metrics

BinYars metrics

binjaextras metrics

binjaextras metrics

Nice to see my #BinaryNinja plugins getting some use

12.02.2026 18:19 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image Post image

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (5/12): "Deconstructing Rust Binaries" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Cindy Xiao

๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: Hybrid (on-site & remote)

๐Ÿ”— Training details: nsec.io/training/202...

#NorthSec #cybersecurity #malwareanalysis #reverseengineering

09.02.2026 17:10 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 2
Preview
Release v1.13.0 ยท VirusTotal/yara-x Add crx and dex modules to Python invoke API (#534). Add Python API for specifying the metadata that should be passed to modules (6bebe34): Output filenames that needs reformatting when using yr fm...

github.com/VirusTotal/y... - Once again, new release with some good bug fixes and nice improvements.

06.02.2026 21:06 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

How can we detect malicious documents exploiting CVE-2026-21509, the recent 0-day vulnerability in MS Office ?
I designed a YARA rule for this, which detects all the malicious files that have been reported.
To get the YARA rule and all the explanations: decalage.info/CVE-2026-215...

06.02.2026 09:14 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
State-backed phishing attacks targeting military officials and journalists on Signal - Help Net Security Germany warns of attempted phishing of politiians, military officials, diplomats, and investigative journalists across Europe via Signal.

"State-backed #phishing attacks targeting military officials and journalists on Signal" by Zeljka Zorz, Editor-in-Chief, Help Net Security February 6, 2026 www.helpnetsecurity.com/2026/02/06/s...

06.02.2026 17:46 ๐Ÿ‘ 1 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Great to collaborate with old friend Duy-Phuc Pham at Trellix on this recent APT28 cluster strikeready.com/blog/apt28s-... www.trellix.com/blogs/resear...

04.02.2026 19:50 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image
30.01.2026 19:37 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Beginner C++ Reverse Engineering - Binary Ninja Live Stream Learn how to recognize and apply types to decompiled C++ that's using virtual functions, inheritance and vtables, recognize and recover missing parameters, a...

Join us today from 3-5pm ET to learn to recognize and apply types to decompiled C++ that's using virtual functions, inheritance, and vtables. We'll recover missing parameters, apply types, clean up decompilation, and everything else you need to get started reversing C++! youtube.com/live/QmsUmvH...

28.01.2026 15:44 ๐Ÿ‘ 7 ๐Ÿ” 4 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

The CertGraveyard is now being leveraged by MagicSword.

MagicSword makes use of certificates we report and blocks them within your environment.

I was really amazed by the work they do to block RMM and bad drivers. Now this further enables orgs to block malicious signers.
x.com/magicswordio/s...

27.01.2026 16:16 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

New blog post is live! Xusheng tears apart a tiny Linux binary that really does not want to be reversed. Malformed ELF headers, segment tricks, layered XOR and RC4, plus a bunch of Binary Ninja tricks along the way. Read it here: binary.ninja/2026/01/23/r...

27.01.2026 15:31 ๐Ÿ‘ 7 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Malware Analysis - Malicious MS Office files without Macros
Malware Analysis - Malicious MS Office files without Macros YouTube video by MalwareAnalysisForHedgehogs

๐Ÿฆ” ๐Ÿ“น New Video: Can office files be malicious without Macros?

โžก๏ธ VSTO Add-Ins
โžก๏ธ External Templates
โžก๏ธ Checklist for Office analysis
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=RtHH...

25.01.2026 07:30 ๐Ÿ‘ 6 ๐Ÿ” 4 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 1

Awesome, time for me to update #BinYars again ๐Ÿ˜„

26.01.2026 17:07 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malwareโ€™s design clearly indicates destructive intent. 1/5

23.01.2026 16:30 ๐Ÿ‘ 35 ๐Ÿ” 30 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 5

Great work by Kim and ESET to get this story out there. The cyber threat has been off the front pages with everything else going on, but is still very real.

23.01.2026 17:48 ๐Ÿ‘ 7 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image

New Children's Health Defense site registered on 1/9/26 and currently in development:
covidjustice[.]org
covidjustice[.]metalteam[.]dev (69.16.249[.]248, dev site)

22.01.2026 13:32 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0