LE BERRE Stéfan (@heurs) 's Twitter Profile
LE BERRE Stéfan

@heurs

CEO/Co-Founder - @ExaTrack

ID: 71741484

linkhttps://exatrack.com calendar_today05-09-2009 06:12:32

759 Tweet

1,1K Followers

406 Following

LE BERRE Stéfan (@heurs) 's Twitter Profile Photo

Kdrill, an open source tool to check if your kernel is rootkited🔥 A python tool to analyze memory dumps AND live kernel. No dep, py2/3, no symbols 💪 It rebuild on the fly kernel structs and check suspicious modifications (and if patchguard is running 👀) github.com/ExaTrack/Kdrill

Kondah Hamza 🦑 (@kondah_ha) 's Twitter Profile Photo

🔍 Chercher des traces de rootkits (Kernel) sur des environnements Windows suite à une compromission ou en threat hunting peut être une des tâches les plus techniquement challengeantes. 🛡️ Microsoft possède un kernel des plus complexes mais aussi sensibles lorsqu'on le manipule,

🔍 Chercher des traces de rootkits (Kernel) sur des environnements Windows suite à une compromission ou en threat hunting peut être une des tâches les plus techniquement challengeantes.

🛡️ Microsoft possède un kernel des plus complexes mais aussi sensibles lorsqu'on le manipule,
Can Bölük (@_can1357) 's Twitter Profile Photo

Excited to share my latest article: PgC - a novel approach to disable Patchguard during runtime using basic memory management principles. It has worked against every version of Patchguard for the last 7 years, without needing any updates! blog.can.ac/2024/06/28/pgc…

Takahiro Haruyama (@cci_forensics) 's Twitter Profile Photo

themida-unmutate - Static deobfuscator for Themida/WinLicense/Code Virtualizer's mutation-based obfuscation github.com/ergrelet/themi…

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

So far, I have written 706 pages to help the security community. My goal will be writing new articles of the Exploiting Reversing Series (ERS), which is focused on security research. However, I am planning to write one or two additional articles of my previous series MAS (Malware

So far, I have written 706 pages to help the security community. My goal will be writing new articles of the Exploiting Reversing Series (ERS), which is focused on security research. However, I am planning to write one or two additional articles of my previous series MAS (Malware
Clement Rouault (@hakril) 's Twitter Profile Photo

In our search for new forensic artifacts at ExaTrack, we sometimes deep dive into Windows Internals. This one is about COM and interacting with remote objects using a custom python LRPC Client. STUBborn: Activate and call DCOM objects without proxy: blog.exatrack.com/STUBborn/

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

Slides & video from our GreHack talk "Attacking Hypervisors - A Practical Case" are online! Learn how we exploited vulnerabilities to escape VirtualBox during Pwn2Own Vancouver 2024: reversetactics.com/publications/2…

The Brofessor (@glacius_) 's Twitter Profile Photo

Hey :) If you missed your daily Frenglish dose, my talk about Octo at Virus Bulletin is now available on Youtube: youtube.com/watch?v=H8y9d_… Talked about malware, infrastructure, bulletproof hoster, and more. The full paper is also available in the description :) Team Cymru Threat Research

ExaTrack (@exatrack) 's Twitter Profile Photo

3+ YEARS of stealth! We uncovered new tactics used by the perfctl malware, including a userland rootkit & an SSH backdoor (a single SPACE in /etc/passwd!). More insights: blog.exatrack.com/Perfctl-using-… #cybersecurity #threat_hunting #linux #infosec #perfctl #rootkit #ssh #exatrack

Nathan Blondel (@slowerzs) 's Twitter Profile Photo

Think HVCI and kCET mean the end of kernel code execution? I wrote a blogpost exploring an alternative way to execute a kernel payload! :) blog.slowerzs.net/posts/keyjumpe…

NoLimitSecu (@nolimitsecu) 's Twitter Profile Photo

#Podcast #Cybersécurité Épisode #501 : détection vs. recherche de compromissions (suite de l'épisode #491), avec LE BERRE Stéfan nolimitsecu.fr/detection-vs-r…

LE BERRE Stéfan (@heurs) 's Twitter Profile Photo

🚀 Take your malware analysis skills to the next level with Exalyze Discover our unique capabilities to compare malware code with our entire database, identifying similar samples and uncovering hidden connections. 👉 exalyze.io Exalyze

Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

A well-done article written by memN0ps: Hypervisors for Memory Introspection and Reverse Engineering: secret.club/2025/06/02/hyp… #reverveengineering #infosec #hypervisor #memoryanalysis #windows #rust

A well-done article written by <a href="/memn0ps/">memN0ps</a>: 

Hypervisors for Memory Introspection and Reverse Engineering:

secret.club/2025/06/02/hyp…

#reverveengineering #infosec #hypervisor #memoryanalysis #windows #rust
ö (@r0keb) 's Twitter Profile Photo

Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. r0keb.github.io/posts/Windows-…

hackyboiz (@hackyboiz) 's Twitter Profile Photo

[Research] CVE-2025-24985: Windows Fast FAT Driver RCE Vulnerability hackyboiz.github.io/2025/07/17/ogu… The vulnerability was caused by the ability to control five variables within the VHD file that determine the number of clusters.

[Research] CVE-2025-24985: Windows Fast FAT Driver RCE Vulnerability

hackyboiz.github.io/2025/07/17/ogu…

The vulnerability was caused by the ability to control five variables within the VHD file that determine the number of clusters.
LE BERRE Stéfan (@heurs) 's Twitter Profile Photo

I'm glad to share my talk at Botconf 2025! Do you want to know how we compare a sample with 150k others in seconds on Exalyze? This talk is made for you 🚀 At the end, you'll get a hint on what's coming next for Exalyze! 😉 youtube.com/watch?v=TS8XO2… exalyze.io