## Tweets
- https://twitter.com/0xor0ne/status/1590615348759629826
<blockquote class="twitter-tweet"><p lang="pl" dir="ltr">Nice intro to Windows rootkits by <a href="https://twitter.com/CyberarkLabs?ref_src=twsrc%5Etfw">@CyberarkLabs</a> <a href="https://t.co/pRdsIhzbqX">https://t.co/pRdsIhzbqX</a> <a href="https://twitter.com/hashtag/malware?src=hash&ref_src=twsrc%5Etfw">#malware</a> <a href="https://twitter.com/hashtag/windows?src=hash&ref_src=twsrc%5Etfw">#windows</a> <a href="https://twitter.com/hashtag/rootkit?src=hash&ref_src=twsrc%5Etfw">#rootkit</a> <a href="https://twitter.com/hashtag/infosec?src=hash&ref_src=twsrc%5Etfw">#infosec</a> <a href="https://twitter.com/hashtag/cybersecurity?src=hash&ref_src=twsrc%5Etfw">#cybersecurity</a> <a href="https://t.co/Kxd4yTFPTb">pic.twitter.com/Kxd4yTFPTb</a></p>— 0xor0ne (@0xor0ne) <a href="https://twitter.com/0xor0ne/status/1590615348759629826?ref_src=twsrc%5Etfw">November 10, 2022</a></blockquote>
## Links
- https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1