Alexei Bulazel

@0xAlexei

Security Researcher | Alumnus | Hacker-In-Residence

Vrijeme pridruživanja: studeni 2015.

Tweetovi

Blokirali ste korisnika/cu @0xAlexei

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xAlexei

  1. proslijedio/la je Tweet
    prije 4 sata
    Odgovor korisniku/ci

    You can still play it now here:

    Poništi
  2. prije 19 sati

    Looking forward to using this Yeti thermos. Awesome prize for completing their RE/exploitation challenge at

    Poništi
  3. proslijedio/la je Tweet
    prije 20 sati

    Legend talks (6): My Favorite Things (starts at 2:30)

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    1. velj

    Not having access to your own published paper is peak academia.

    Poništi
  5. 1. velj

    ShmooCon 2020: alum Austin Ralls talks about analyzing Android applications with Binary Ninja

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    has 151 trainings. We have 18. 18 of the best hacker trainings you can ever find. Early 🐦 prices are still available at ! Register now ➡️ RTs appreciated!

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    what if i just send trusted input instead of untrusted input

    Poništi
  9. proslijedio/la je Tweet
    30. sij

    An example is available at . Seems like there’s sufficient interest so I’ll plan to get started on those blog posts soon!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    29. sij

    Added a new interface to PANDA today which mostly recreates Unicorn Engine but with support for taint analysis (and all the other existing PANDA features). Might be time for a series of blog posts about using PANDA from python.

    Prikaži ovu nit
    Poništi
  11. 29. sij

    This is really cool, more conferences should do this - I certainly would have appreciated it as a young conference speaker

    Poništi
  12. proslijedio/la je Tweet
    29. sij

    Here's the bibliography for an automatic exploit generation talk I'm giving tomorrow. If you're looking for a reading list on the topic, this should have almost everything for historical context and state of the art

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    29. sij

    Maybe the best overview of the 5G/Huawei issue I've read, which also touches on a more fundamental reality: "The tools and language of traditional cybersecurity are ill-equipped to describe and manage a world in which the Chinese state entwines Chinese tech giants."

    Poništi
  14. 29. sij
    Poništi
  15. proslijedio/la je Tweet
    29. sij

    A former head of the Australian Signals Directorate’s SIGINT & offensive cyber mission excoriates the UK Huawei decision. "they have doubled down on a flawed and outdated cybersecurity model to convince themselves that they can manage the risk" 

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    29. sij
    Odgovor korisniku/ci

    It's not about right or wrong, but aptness. It's Intel's processor, Intel's instruction set and Intel's syntax. Using another syntax in examples of assembly-language programming of Intel's processors, especially when the examples are only of Intel's processors, is a bit perverse.

    Poništi
  17. proslijedio/la je Tweet
    29. sij
    Odgovor korisniku/ci

    Intel made the ISA, thus their syntax is correct by definition.

    Poništi
  18. proslijedio/la je Tweet
    28. sij

    Some things make more sense when one realizes that there are at least 5 distinct security communities: Security product people (people that view security as something that can be added by buying/selling products), Security Infrastructure people (people that view security as ...

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    27. sij

    Slides from my S4x20 talk are up at !

    Poništi
  20. proslijedio/la je Tweet
    27. sij

    PoC||GTFO 0x20, “This janky old piano has a few more tunes! And so do you! And so do I!” is out! Ready to warm you up during these Winter months come and collect it at the EU mirror (SSL, , ):

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·