Tristan P.
trustnull.bsky.social
Tristan P.
@trustnull.bsky.social
Hunting pokemons for a living @exatrack.bsky.social
Reposted by Tristan P.
I'm glad to share my talk at @botconf.infosec.exchange.ap.brid.gy 2025!
Do you want to know how we compare a sample with 150k others in seconds on @exalyze.bsky.social? This talk is made for you🚀
At the end, you'll get a hint on what's coming next for Exalyze 😉
youtube.com/watch?v=TS8X...
exalyze.io
10 Years of Large-Scale Malware Comparison: Going Deeper With Machoke
YouTube video by botconf eu
youtube.com
July 23, 2025 at 8:16 AM
Reposted by Tristan P.
Why is it I can recognize malware configurations seen in just two campaigns from over a year ago but cannot remember people’s names who I’ve met multiple times
May 12, 2025 at 9:32 PM
Reposted by Tristan P.
3+ YEARS of stealth! We uncovered new tactics used by the perfctl malware, including a userland rootkit & an SSH backdoor (a single SPACE in /etc/passwd!). More insights: blog.exatrack.com/Perfctl-usin... #cybersecurity #threat_hunting #linux #infosec #perfctl #rootkit #ssh #exatrack
Perfctl malware exploiting exposed Portainer agent and using new SSH persistenceExaTrack
blog.exatrack.com
December 17, 2024 at 10:02 AM