avallach

@xorhex@infosec.exchange
430 Followers
1,083 Following
1.7K Posts
πŸ‡ΊπŸ‡¦ Malware Researcher πŸ‡ΊπŸ‡¦
Posts are my own and do not reflect my employer.
mlgethttp://github.com/xorhex/mlget
bloghttps://blog.xorhex.com
twittodonhttps://twittodon.com/share.php?t=xorhex&m=xorhex@infosec.exchange

#mlget has been updated - your 1 stop shop for finding malware across different services!

Grab an updated copy at https://github.com/xorhex/mlget/releases/tag/v3.4.2

Happy to add additional services if folks know of more!

Some services I no longer have access to for testing - see the Alt text for more info.

#binaryninja doing the math for me

A πŸ¦„ is coming soon to #BinjaExtras

#binaryninja

So most folks purchase 4 decompilers...?

That and sales for IDA PRO EXPERT 4 (the most popular option) just started today... πŸ€”

#idapro

#x64dbg allows you to break on user loaded DLLs. This is very helpful when working with #sideloadeddlls.

The same can be done via #idapro using a break point condition and specifying the DLL name.

get_event_id()== LIB_LOADED && strstr(get_event_module_name(), "<name>.dll")
!= -1

#ida

Looking at UTM SE on the App Store; spotted #ida on one of the VMs for download. Feels like this is a game of β€œwhere is IDA?”(versus Waldo) πŸ˜‚

https://mac.getutm.app/gallery/

Gallery

Virtual machines for Mac

osy

Want to use IDA's remote debugger but finding it challenging/tedious to make Scylla Hide work for it?

Check out https://github.com/xorhex/remote_ida_scylla_inject

This project will monitor the remote IDA debugging instance and any child process found (minus conhost.exe) will have the generic Syclla Hide injector run against the target PID.

#IDA #IDAPro #ScyllaHide

GitHub - xorhex/remote_ida_scylla_inject: Auto inject Scylla Hide hooklibrary into child processes of IDA's remote debugger process.

Auto inject Scylla Hide hooklibrary into child processes of IDA's remote debugger process. - xorhex/remote_ida_scylla_inject

GitHub
You know you’ve been staring at the same malware family for too long when you can recognize it by its control flow obfuscation πŸ™ƒ

Added sockaddr_in.sin_addr and sockaddr_in.sin_port representations to #IDA’s right click context menu.

Download the plugin from here: https://github.com/xorhex/IDAExtras

#idapro #idaplugin

GitHub - xorhex/IDAExtras

Contribute to xorhex/IDAExtras development by creating an account on GitHub.

GitHub

Working on a custom IDA Exports screen to give some more detail on the exported functions. I might have gotten tired of hunting through to many exports that are just `C2 00 00 retn 0` looking for the one that did something.

Mastodon didn't like my GIF, so pictures it is.

#idapro #idaplugin #workinprogress