Thomas Roccia  

@fr0gger_

Sr. Security Researcher , Malware Warlock, Reverse Engineer - Former , Goon , Creator of - Tweets are my own

 - 
ಜನವರಿ 2011 ಸಮಯದಲ್ಲಿ ಸೇರಿದ್ದಾರೆ

ಟ್ವೀಟ್‌ಗಳು

ನೀವು @fr0gger_ ಅವರನ್ನು ತಡೆಹಿಡಿದಿರುವಿರಿ

ಈ ಟ್ವೀಟ್‌ಗಳನ್ನು ವೀಕ್ಷಿಸಲು ನೀವು ಖಚಿತವಾಗಿ ಬಯಸುವಿರಾ? ಟ್ವೀಟ್ ವೀಕ್ಷಣೆಯು @fr0gger_ ಅವರ ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ

  1. ಪಿನ್ ಮಾಡಿದ ಟ್ವೀಟ್
    ಜನವರಿ 2,2021

    I mainly tweet about: ⚔️ 👾 Evasion Techniques 💻 Technical blogs on Medium 🤖 Github projects I code or contribute 🖼 Security artwork or cheat sheet I create 🤓 My public presentation 🥃 Sometimes on 3D printing, electronics, whisky

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು
  2. 23 ಗಂಟೆಗಳ ಹಿಂದೆ

    Saturday morning welding! While I'm not doing cyber stuff, I'm making or fixing stuff! Don't judge my soldering it works and that's all that matters! 😁

    ರದ್ದುಗೊಳಿಸು
  3. ಜೂನ್ 8

    I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)! Which one are you using the most? 🐍

    ರದ್ದುಗೊಳಿಸು
  4. ಜೂನ್ 6

    Just updated the Awesome IDA Plugin list with the latest Time Travel Debugging plugin for IDA by Cert Airbus! Pretty cool stuff! 🤩 💻 👉

    ರದ್ದುಗೊಳಿಸು
  5. ಜೂನ್ 4

    Are Ransomware Attacks Happening on Mars? 🔒

    ರದ್ದುಗೊಳಿಸು
  6. ಜೂನ್ 4

    Very cool resource to start analysis MacOS malware by . From configuring a safe analysis environment to Mach-O binary analysis and dynamic analysis!🙂

    ರದ್ದುಗೊಳಿಸು
  7. ಜೂನ್ 2

    For interactive visualization you can also have a look to the html version of the Jupyter Notebook where you can explore by yourself some of the data. Have fun! 🤓

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು
  8. ಜೂನ್ 2

    Along with the blog, we also published a Jupyter Notebook with all the code. It uses visualization and MSTICpy our open-source threat intelligence library!

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು
  9. ಜೂನ್ 2

    In February, the was revealed. I wrote an in-depth blog post that shows a methodology for analyzing Conti Jabber logs using Python. Have a look as the code can be applied to multiple data sources. 👇

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು
  10. ಮೇ 28

    Looks like we have a new feature on that shows the different malware collection!

    ರದ್ದುಗೊಳಿಸು
  11. ಮೇ 28

    Off topic: Last year, I started creating some digital art just for fun. I never shared it but here are some stuffs I created! Named in that order👇 - Catacombs - Vegas

    ರದ್ದುಗೊಳಿಸು
  12. ಮೇ 28

    It is common and expected but many scams are going around following the recent launch of . Some example are luring the Terra Station support! It is basic but don’t put your wallet recovery words anywhere! 😅

    ರದ್ದುಗೊಳಿಸು
  13. ಮೇ 22

    I don't want to spoil you but the first episode of last season of Love Death and Robot is rather… visionary 😅

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು
  14. ಮೇ 19

    I coded a python tool for domain hunting relationship using and ! You can play with it in binder and adapt the code if you like! 🤓 cc: 🔬Notebook:

    ರದ್ದುಗೊಳಿಸು
  15. ಮೇ 18

    Oh wow! Next time you remove authorship from my stuff, at least keep the same font for the title.😅

    ಈ ಟ್ವೀಟ್ ಲಭ್ಯವಿಲ್ಲ.
    ರದ್ದುಗೊಳಿಸು
  16. ಮೇ 18

    6⃣ Scams and other social engineering tactics Cryptocurrency-related scams typically attempt to lure victims into sending funds of their own volition. In some cases, personalities are used to deceive targets.

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು
  17. ಮೇ 18

    5⃣ Phishing sites and fake applications To fool users into entering their private keys, attackers create malicious applications that spoof legitimate hot wallets.

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು
  18. ಮೇ 18

    4⃣Keylogging Like other information-stealing malware that use this technique, keylogging cryware typically runs in the background of an affected device and logs keystrokes entered by the user.

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು
  19. ಮೇ 18

    3⃣ Wallet file theft In this scenario, an attacker traverses the target user’s filesystem, determines which wallet apps are installed, and then exfiltrates a predefined list of wallet files.

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು
  20. ಮೇ 18

    2⃣Memory dumping Critical information such as private keys might remain in the memory of a browser process for example, thus compromising the wallet’s integrity.

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು
  21. ಮೇ 18

    1⃣Clipping and switching: "Cryware monitors the contents of a user’s clipboard and uses string search patterns to look for and identify a string resembling a hot wallet address." We also discussed that technique at with in 2017! >

    ಈ ಥ್ರೆಡ್ ತೋರಿಸಿ
    ರದ್ದುಗೊಳಿಸು

ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.

Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.

    ಇದನ್ನೂ ಸಹ ನೀವು ಇಷ್ಟಪಡಬಹುದು

    ·