Advertisement ยท 728 ร— 90

Posts by cmex

As of this morning I am unemployed. I am looking for work! I have a range of experience that can be valuable to the right team. A short list of relevant skills that I'd call out: reverse engineering & vuln research, DFIR, project management, infrastructure architecting, system administration.

9 months ago 61 30 2 5
Post image
10 months ago 2 0 0 0
Preview
PRELUDE Crypto Heist Causes HAVOC | Cyber and Data Resilience | Kroll During the investigation of a large-scale crypto currency theft, Kroll researchers discovered two new pieces of malware. These pieces of malware ultimately lead to the deployment of Havoc C2โ€™s agent โ€œ...

Fun engagement we worked on, very interesting mix of samples. Been looking forward to this one getting published:

11 months ago 0 0 0 0
Video

I started this project without an idea, etc. I'm just learning what I can make the #Dreamcast do. So far, I have a controllable, stationary camera in 3D space that loads an asteroid field, bkgrnd music, fonts, menu, and networking (BBA) that loads a msg from a server (XML).

#Homebrew #GameDev #Sega

1 year ago 93 19 6 0

noice

1 year ago 123 4 4 1
Post image
1 year ago 0 0 0 0
Preview
Brute Forcing DARKGATE Encodings | Cyber Risk | Kroll Kroll recently analyzed newer versions of DARKGATE, a Windows-based malware sold on the dark web, which randomly shuffles the non-standard alphabet in use. Kroll identified a weakness in this shufflin...

Crazy leet analysis.

TL;DR the darkgate encoding method uses a randomized base64 alphabet based on victim system characteristics. While this encoding attempts to obscure the config and keylogging output, a weakness in the seed generation makes the randomization predictable.

1 year ago 1 0 0 0