Myrtus
@Myrtus0x0
Malware Researcher | Developer | @Cryptolaemus1 | @NVIDIA bsky: [email protected]
In case you missed it, gave a talk on #smokeloader! Went over my process for extracting configuration, general reverse engineering and protocol emulation youtube.com/watch?v=O69eMQ…
I’ve spent the past few years deep in the weeds of threat intel. Tracking APTs, mapping malware ecosystems, and hunting adversary campaigns. Open to roles (remote or relo) where I can keep digging into emerging threats + work with strong, collaborative teams 🔥
If you aren’t keeping an eye on #transferloader, I recommend changing that. This malware has consumed way too much of my time
Fun crossover blog about TA829 (RomCom) & TransferLoader with my ecrime pals it’s got everything: 🛰️ Popped routers for sending phish 📊 ACH on attribution 👾 custom protocols 👽 cool malware 🕵️ crime 🎯 espionage ❔many unanswered questions proofpoint.com/us/blog/threat…
Hiring a junior/mid role on my team for a Red Team operator, feel free to DM me with any questions or anything nvidia.wd5.myworkdayjobs.com/NVIDIAExternal…
As mentioned on the stream, we are giving away a voucher to @stvemillertime ‘s YARA course Check stream for details and reply to any of the social posts with the rules that inspired you to win! networkdefense.co/courses/yara/
100 Days of YARA, YARA Rule Tips and The Current State of Email borne Threats with Greg Lesnewich x.com/i/broadcasts/1…
Malware Archaeology : Cascade (1701, 1704) virus. It is a computer virus that was discovered in 1987 and was discovered in South Korea in January 1990. xcoolcat7.tistory.com/91555 (Korean)
My tolerance for snake oil in this industry is getting way too thin
Exciting! @vector35's excellent #BinaryNinja ships with built-in BinExport in the latest dev version! Here's how to use it with #BinDiff: dev-docs.binary.ninja/guide/binexpor…
I'm pleased to announce a new version of the Rust bindings for @HexRaysSA IDA Pro! With: - Improved strings, metadata, and core APIs - Support for the name API Thank you to @0xdea & @williballenthin for contributing! Docs: idalib.rs Code: git.idalib.rs
Ticket sales are live! You can sign up for all trainings and conference tickets now. Our round 1 tickets are even cheaper than last year, but the price will be going up for round 2 and 3. re-verse.io
Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! infinitycurve.org/blog/introduct…
🤩 GuidedHacking's Anti-Cheat Development Course 🚀 COMING SOON!!
I am begging people who don’t know anything about cybersecurity to stop talking about cybersecurity malware isn’t the flashy junk you saw in the 90’s anymore most malware nowadays run in the background harvesting session IDs and passwords from your computer
Computer viruses are such a non entity in 2025 I don’t know where all these zoomers who are concerned trolling about viruses came from.
while stack strings can be annoying in malware, I love that for the majority of the cases they are basically completely independent. Even if theyre being decrypted after constructed. Makes solutions like binary emulation a bit more viable