Volexity's Avatar

Volexity

@volexity.com

A security firm providing Incident Response, Proactive Threat Assessments, Trusted Advisory, and Threat Intelligence // volexity.com

1,178
Followers
7
Following
44
Posts
22.10.2024
Joined
Posts Following

Latest posts by Volexity @volexity.com

Follow the GoResolver GitHub repo for future updates: github.com/volexity/GoR...

Special thanks to Killian Raimbaud for these updates & Ivan Maldenov for his work on the type recovery feature during his Volexity internship. [8/8]

10.03.2026 17:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Existing report files remain fully compatible with GoResolver v1.4. Previously generated JSON reports can still be imported using the latest plugin versions; there is no need to re-analyze old samples. [7/8]

10.03.2026 17:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

GoResolver’s Ghidra plugin now includes an ANALYZE mode for in-SRE analysis. After running, GoResolver automatically imports recovered symbols and types into Ghidra's database. Go version management for Ghidra still requires the CLI. [6/8]

10.03.2026 17:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Hex-Rays Plugin Repo Discover powerful plugins for IDA Pro to streamline reverse engineering and binary analysis. Improve efficiency with automation, visualization, and advanced decompilation tools.

The IDA Pro plugin for GoResolver now supports full in-SRE analysis. GoResolver is available in Hex-Rays’s plugin repository and is installable via HCLI. The updated interface displays installed/available Go versions & allows version management without the CLI. [5/8]

10.03.2026 17:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

GoResolver v1.4 introduces Go type recovery via the new "-y" flag, and includes new capabilities to extract type names, structures, and kinds from obfuscated binaries. Browsing the binary’s types is now much easier and works with your SRE’s cross-referencing feature. [4/8]

10.03.2026 17:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

To improve accuracy, GoResolver can now automatically detect which Go version a binary was compiled with and select the closest available version for analysis. This release also optimizes how users list, install & remove Go versions directly from the CLI. [3/8]

10.03.2026 17:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

With this release, GoResolver’s CLI has been restructured into two core commands, "resolve" for binary analysis & "manage" for handling Go installations, making the toolchain cleaner and easier to navigate. [2/8]

10.03.2026 17:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
GitHub - volexity/GoResolver: GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the function symbols of an obfuscated Go ... GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the function symbols of an obfuscated Go binary. - volexity/GoResolver

@volexity.com recently released GoResolver v1.4, bringing significant updates to our #opensource tool for recovering symbol data from obfuscated Go binaries. This release is available on GitHub: github.com/volexity/GoR... [1/8]

10.03.2026 17:21 πŸ‘ 8 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0
Preview
The 2025 Volatility Plugin Contest results are in! Results from the 13th Annual Volatility Plugin Contest are in! We receivedΒ 8Β submissions fromΒ 7Β different countriesΒ that includedΒ 20Β plugins. Contest submissions included a range of features…

We are excited to announce the First Place winner of the 2025 #Volatility #PluginContest is:

Daniel Baier for XRFM Inspector

See the full Contest Results in our blog post: volatilityfoundation.org/the-2025-vol...

Congrats to all winners & thank you to all participants!

#DFIR #memoryforensics

06.03.2026 14:25 πŸ‘ 4 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0
Post image

Volatility New Release: #volatility3 v2.27.0 - visit github.com/volatilityfo... for details and downloads.

#memoryforensics #dfir

30.01.2026 14:30 πŸ‘ 3 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
Contact If you'd like to learn more about Volexity, please contact us!

Contact us for more information about Volexity Volcano Server & Volcano One: volexity.com/company/cont... [3/3]

05.01.2026 16:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Volexity Volcano Server & Volcano One v25.12.18 also adds cross-account s3 bucket monitoring, automated health check alerts, SAML role mappings, and increased auditing. [2/3]

05.01.2026 16:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

Volexity Volcano Server & Volcano One v25.12.18 adds 300+ YARA rules, full parsing of Windows prefetch and Linux cron jobs, inline syscall hooking detection, and 5-level page table support. [1/3]

05.01.2026 16:39 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

And that’s it! The 2025 #Volatility #PluginContest is now closed. Stay tuned for winner announcements in the coming weeks! And good luck to all contenders!
#memoryforensics #opensource #dfir

01.01.2026 15:22 πŸ‘ 4 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

Today is the last day to submit entries to the #PluginContest! This is your chance to gain industry-wide visibility for your work, contribute to an important open-source project, and compete for cash prizes! More details below!πŸ‘‡

31.12.2025 14:47 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 1

There are only 2 days left to submit your entries to the #Volatility #PluginContest! The deadline is Wednesday!

29.12.2025 19:46 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

You have 5 more days to submit your entries to the #Volatility #PluginContest!

26.12.2025 15:11 πŸ‘ 1 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

There are 9 days left to submit entries to the #Volatility #PluginContest! Make sure to get your submissions in by the deadline!

22.12.2025 13:30 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

The @volatilityfoundation.org #PluginContest closes on Dec 31, 2025! Make sure to submit your entry by the deadline! If you’re looking for inspiration, take a look at our roll call of past contest submissions: volatilityfoundation.org/volatility-p....

#memoryforensics

08.12.2025 18:57 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 1
Preview
Dangerous Invitations: Russian Threat Actor Spoofs European Security Events in Targeted Phishing Attacks In early 2025, Volexity published two blog posts detailing a new trend among Russian threat actors targeting organizations through the abuse of Microsoft 365 OAuth and Device Code authentication workf...

@volexity.com tracks a variety of threat actors abusing Device Code & OAuth authentication workflows to phish credentials, which continue to see success due to creative social engineering. Our latest blog post details Russian threat actor UTA0355’s campaigns impersonating European security events.

04.12.2025 18:36 πŸ‘ 10 πŸ” 8 πŸ’¬ 0 πŸ“Œ 0
Preview
How AI is changing hacking The tech company Anthropic’s AI technology was used by Chinese-backed hackers trying to breach foreign governments and major corporations.

@stevenadair.bsky.social recently spoke with Here & Now’s Scott Tong (@npr.org @wbur.org) about @volexity.com’s discovery of China-aligned threat actor UTA0388 using AI + LLMs in targeted phishing attacks. Listen here: www.wbur.org/hereandnow/2...

03.12.2025 20:04 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
APT Meets GPT: Targeted Operations with Untamed LLMs Starting in June 2025, Volexity detected a series of spear phishing campaigns targeting several customers and their users in North America, Asia, and Europe. The initially observed campaigns were tail...

Check out our recent blog post for more details on how UTA0388 used AI + LLMs in their operations: www.volexity.com/blog/2025/10...

14.11.2025 16:28 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

@volexity.com has continued to see nation-state threat actors use AI + LLMs to assist in cyber attacks. Our recent research on a Chinese APT threat actor (UTA0388) using AI in its operation was something @stevenadair.bsky.social recently discussed with the @wsj.com.

14.11.2025 16:28 πŸ‘ 4 πŸ” 4 πŸ’¬ 1 πŸ“Œ 0
Preview
The 13th Annual Volatility Plugin Contest is Open! We are excited to announce that the Volatility Plugin ContestΒ is officially open for submissions! The annual Plugin Contest is your opportunity to: Directly contribute to the open source forensics …

The 13th annual @volatility #PluginContest is OPEN for submissions until 31 Dec 2025!

This contest is designed to encourage research & development in the field of #memoryanalysis. Every year, contributions from all around the world continue to help build the next generation of #memoryforensics.

29.10.2025 15:37 πŸ‘ 1 πŸ” 4 πŸ’¬ 0 πŸ“Œ 4
Post image Post image Post image Post image

We had a great day yesterday at #FTSCon 2025! FTSCon Week continues with @joegrand.bsky.social's Hardware Hacking Basics + #Volatility Malware & Memory Forensics training with @attrc.bsky.social, Michael Ligh + Dave Lassalle.

21.10.2025 13:37 πŸ‘ 3 πŸ” 5 πŸ’¬ 0 πŸ“Œ 0
Post image

@stevenadair.bsky.social is back again!

Founder + President of Volexity leading a team of experts that deal w/ complex cyber intrusions from nation-state level intruders. His talk will cover a Chinese APT actor that Volexity tracks as UTA0388.

Check out the official agenda:
cyberwarcon.com

15.10.2025 15:11 πŸ‘ 2 πŸ” 5 πŸ’¬ 0 πŸ“Œ 1

Registration for #FTSCon 2025 closes tomorrow! We are really excited to see everyone on Monday, October 20th!

10.10.2025 12:03 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
APT Meets GPT: Targeted Operations with Untamed LLMs Starting in June 2025, Volexity detected a series of spear phishing campaigns targeting several customers and their users in North America, Asia, and Europe. The initial observed campaigns were tailor...

APT meets GPT: @volexity.com #threatintel is tracking #threatactor UTA0388's spear phishing campaigns against targets in North America, Europe & Asia, appearing to use LLMs to assist their ops. Letting #AI run your espionage operations? What could go wrong?

08.10.2025 12:35 πŸ‘ 3 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Post image

We would like to thank @volexity.com for sponsoring the #FTSCon 2025 Evening Reception, which will be at VUE Rooftop DC this year! If you haven’t registered for FTSCon yet, there’s still time! Registration closes Sunday Oct 12; learn more + register here: volatilityfoundation.org/from-the-sou...

07.10.2025 16:47 πŸ‘ 3 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0