OPERATIONAL_STATUS: ACTIVE

> WHOAMI

Forged by offensive and defensive practitioners, 0xD3lta Research focuses on the real mechanics of modern intrusions. We work in the environments where attacks unfold for real.

By blending offensive insight with defensive precision, we convert adversary tradecraft into reliable, high-impact protection.

"If you're looking for marketing-safe security, we're not it."

KERNEL: 5.16.3-HARDENED
ENCRYPTION: AES-256-GCM

Latest Intelligence

[ DECLASSIFIED_REPORTS ]

HIGH
Malware Analysis & Reverse Engineering
2026-04-24

Technical Analysis: UpCrypter Loader Delivering XWorm V5.6 RAT Targeting Brazilian Users

Full chain analysis of a multi-stage campaign delivering XWorm V5.6 via a .NET loader (UpCrypter) disguised as a NF-e lure, with complete static, dynamic, and config extraction.

0x_OLYMPUS
ACCESS
INFO
Cyber Threat Intelligence
2026-04-07

TheGentlemen Ransomware: Threat Overview and Analysis

Technical overview of TheGentlemen ransomware group, covering its operational model, TTPs, initial access vectors, and defensive considerations.

ANKHCORP
ACCESS
CRITICAL
Web Security
2026-01-28

Critical 10.0: Full BI Infrastructure Compromise via Default Credentials

A detailed write-up on how factory-default credentials on a MicroStrategy administrative panel led to a complete takeover of corporate Business Intelligence assets.

SERROS404
ACCESS

Core Operators

[ UNIT_MEMBERS ]

ID: 0X__01
ONLINE

0x_OLYMPUS

Threat Research Leader

Reverse EngineeringAPT TrackingMalware Analysis
ID: SPE_02
ONLINE

SPECIEUNKN0WN_

SOC LEADER

Mobile SecurityData PrivacySecOps
ID: VAM_03
ONLINE

VAMPIR3BLUES

THREAT RESEARCH OPERATOR

Threat IntelThreat HuntingMalware Analysis
ID: SER_04
ONLINE

SERROS404

RED TEAM LEADER

Active DirectoryMalware DevEvasion
ID: ANK_05
ONLINE

ANKHCORP

RED TEAM OPERATOR

Web ExploitationOSINTC2 Infra

// ACCESS_LEVEL: PUBLIC //