Tweetovi

Blokirali ste korisnika/cu @0x00pico

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x00pico

  1. Prikvačeni tweet
    19. pro 2018.

    Working on a new idea

    Poništi
  2. proslijedio/la je Tweet

    99 smart phones in a pull-cart = instant traffic jam

    Poništi
  3. proslijedio/la je Tweet
    2. velj
    Poništi
  4. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  7. proslijedio/la je Tweet
    14. sij
    Poništi
  8. proslijedio/la je Tweet
    14. sij

    Reverse engineering course (Focuses on x64 Windows) : cc

    Poništi
  9. proslijedio/la je Tweet
    14. sij

    Awesome Forensics Resources : Almost 300 open source forensics tools and 600 blog posts about forensics &1000+ Github Repos about Security Resource Collection :

    Poništi
  10. proslijedio/la je Tweet
    3. sij

    Reverse Engineering Encrypted Code Segments: by Ryan Cornateanu

    Poništi
  11. proslijedio/la je Tweet
    30. pro 2019.

    Apple: we’re the most secure OS! No bugs, don’t look. Corellium: *provides researches with a proper research environment to find bugs and test their apps* Researchers: *find and report bugs using Corellium* Apple: no no no no nooo NO 😱 *sues Corellium*

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    29. pro 2019.

    Open source RAT collection, and malicious RAT analysis reports.

    Poništi
  13. proslijedio/la je Tweet
    14. pro 2019.

    Archive of is now available | All attachments are public | Note that attachments have PHP file extension but are actually archives | Rename according to its file type (ZIP, RAR, ...) and open it | Thanks for everybody who contributed over those ~10 years!

    Poništi
  14. proslijedio/la je Tweet
    11. pro 2019.

    Understand attack surface of statically linked binaries in Linux and learn how to harden them

    Poništi
  15. proslijedio/la je Tweet
    11. pro 2019.

    DLL Hijacking for Dummies [1/2] > Download and run this process monitor () > Download and run target's desktop app > Look for processes with result "name not found" > Note down the paths of these processes

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    11. pro 2019.

    New blog post: "CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM" where I mostly talk about Tokens and Impersonation. 🔥 👉

    Poništi
  17. proslijedio/la je Tweet
    8. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    9. pro 2019.

    I wrote a guide for beginners about windows library code:) In this guide I describe how the compilation and linkage model works in windows at the assembly level - static and dynamic libraries, etc. Have fun 🙃

    Poništi
  19. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  20. proslijedio/la je Tweet
    2. pro 2019.

    Hidviz is a GUI application for in-depth analysis of USB HID class devices

    Poništi
  21. proslijedio/la je Tweet
    24. stu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·