Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile
Josh Stroschein | The Cyber Yeti

@jstrosch

Reverse engineer at FLARE/@Google | @pluralsight author | 😱 1M+ views on YT | 🎙️ Host of Behind the Binary podcast 👇

ID: 53809084

linkhttps://thecyberyeti.com calendar_today05-07-2009 01:40:42

4,4K Tweet

11,11K Followers

1,1K Following

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🎙️ It's here - the next episode of Behind the Binary! In this episode we're joined by Thomas Roccia, security researcher at Microsoft. Thomas discusses the growth of the Unprotect project, how AI is changing security research, and the impact of using data visualizations for

abuse.ch (@abuse_ch) 's Twitter Profile Photo

#ItsNewFeatureTuesday! (That’s a thing, right?) 😎 You can now share searches with 3rd parties without them needing to authenticate to view the results! It’s a neat feature that will save time and hassle. Here's how it works ⤵️ 1) User (authenticated!) searches on

#ItsNewFeatureTuesday! (That’s a thing, right?) 😎
You can now share searches with 3rd parties without them needing to authenticate to view the results! It’s a neat feature that will save time and hassle.

Here's how it works ⤵️
1) User (authenticated!) searches on
Ryan "Chaps" Chapman (@rj_chap) 's Twitter Profile Photo

Let's have a REAL talk about Scatted Spider and what they've done to alter the ransomware landscape. Join us, and be ready to fire off those questions!

Malcat (@malcat4ever) 's Twitter Profile Photo

You can now check your strings in #malcat against an online library of #Malpedia FLOSSed strings. Just copy this plugin, courtesy of Daniel Plohmann : github.com/malpedia/malpe…

You can now check your strings in #malcat against an online library of #Malpedia FLOSSed strings. Just copy this plugin, courtesy of <a href="/push_pnx/">Daniel Plohmann</a> :

github.com/malpedia/malpe…
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

💪 If you're struggling to figure out how to get started learning reverse engineering or malware analysis I've put this resource together for YOU! 👉 thecyberyeti.com/where-do-i-sta… A mix of free and paid content - I laid out a path and my reasons for each step. Hopefully it helps!

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🔥 I've added a new member's only playlist - this covers the internals of runtime-linking in Windows 👇 youtube.com/playlist?list=… Must know information for all Windows reversers!

🔥 I've added a new member's only playlist - this covers the internals of runtime-linking in Windows 👇 

youtube.com/playlist?list=… 

Must know information for all Windows reversers!
Karsten Hahn (@struppigel) 's Twitter Profile Photo

Virut part II: process infection and NTDLL hooking 🦔📹 ➡️x64dbg scripting ➡️conditional breakpoints ➡️more import table resolving ➡️fixing control flow ➡️marking up hook code #MalwareAnalysisForHedgehogs #Virut youtube.com/watch?v=nuxnvj…

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🤗 If you're looking for a place to learn malware analysis or reversing, check out my Discord server. You can join from my site: thecyberyeti.com Also a great place to share knowledge and help those looking to learn the ways.

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🗓️ Mark your calendars - live streams resume next week! Thomas Roccia will be joining the stream to talk about AI prompt hunting with his project NOVA. youtube.com/live/UWsHJAWWD… We'll also discuss the YARA Toolkit - another one of his projects that is a must for YARA users.

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🔔 Just a reminder that the next live stream is this Thursday at 5pm CDT! Thomas Roccia will be joining to talk about two of his projects - NOVA and YARA Toolkit! youtube.com/live/UWsHJAWWD…

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🔒 Ever wonder how software stays secure? On Behind the Binary, Tim Blazytko, Chief Scientist at Emproof, explores code obfuscation, anti-reverse engineering, and modern defense strategies. Discover the challenges, trade-offs, and defender's mindset! 🎧 open.spotify.com/episode/7yJBuB…

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

Honored to join Josh Stroschein | The Cyber Yeti on his podcast "Behind the Binary"! We discussed my RE journey, identifying & analyzing obfuscated code, software protection in industry vs malware, the dynamic between building & breaking protections, ... open.spotify.com/episode/7yJBuB…

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

📣 Today's live stream with Thomas Roccia has been rescheduled to next Tuesday at 5pm CDT - same link though :) Hope to see you then! youtube.com/live/UWsHJAWWD…

L0Psec (@l0psec) 's Twitter Profile Photo

New RE Video: youtube.com/watch?v=3imRXE… In this video, I analyze a recent DPRK attributed Mach-O. Not a complicated sample, however does highlight some strange function calling which may interfere with static analysis. Enjoy! :)