![X Cyber Feed Profile](https://pbs.twimg.com/profile_images/1863150544421830656/Nd0mMs5r_x96.jpg)
X Cyber Feed
@xcyberfeed
Followers
5
Following
152
Statuses
67
Securing Tomorrow, One Byte at a Time
Europe
Joined November 2024
RT @Unit42_Intel: The latest #HeartCrypt update removes position-independent code (PIC) from a PE file's resource data and now stores the p…
0
30
0
RT @ptracesecurity: OtterCookie, a new malware used by Contagious Interview #pentesting #CyberSecurity #infosec htt…
0
12
0
RT @ale_sp_brazil: The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on: I would li…
0
205
0
RT @Print3M_: "Top 50 Techniques & Procedures" Real world malware delivery and initial access techniques (red team…
0
88
0
RT @0xor0ne: Easy introduction to cryptography concept with practical examples in Linux (openssl) Part 1: Part 2:…
0
219
0
RT @ptracesecurity: 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM. https://t.co…
0
23
0
RT @5mukx: Windows Internals and Programming resources: It covers: [Programming, Red Teaming, Exploit, Kernel, Certificates] Source code…
0
99
0
A good blog post about KASLR (Kernel Address Space Layout Randomization) Credits @_shadowintel_
0
0
0
RT @lontze7: 🚨 Lumma 2024: Dominating the Info-Stealer Market 🚨 📖 Read the full blog here: #CyberThreatIntelligen…
0
61
0
RT @chessMan786: Let's Build a Compiler from Scratch - great tutorial divided into 16 parts - you can get the link in the comment below htt…
0
107
0
RT @Dinosn: CVE_Prioritizer: Streamline vulnerability patching with CVSS, EPSS, and CISA’s Known Exploited Vulnerabilities
0
17
0
RT @slava_moskvin_: My Linux Fuzzing series: Discovering the same bug with and without KASAN: Setting up syzkalle…
0
29
0
RT @junr0n: Ever wanted to just call `decrypt(flag)` directly in IDA? Now you can, with ida2py's new angr integration! Check it out: http…
0
70
0