Alexei Bulazel

@0xAlexei

Security Researcher | Alumnus | Hacker-In-Residence

Vrijeme pridruživanja: studeni 2015.

Tweetovi

Blokirali ste korisnika/cu @0xAlexei

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xAlexei

  1. proslijedio/la je Tweet
    prije 10 sati

    The video for my 2019 talk, "Using WPP and TraceLogging Tracing to Facilitate Dynamic and Static Windows RE" is available. Video: Slides: Data sources... data sources everywhere...

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 12 sati

    's paper review series is sweet! Lots of small fun facts as well. For example, 16 bit register variants are slower than their 64 bit counterparts

    Poništi
  3. proslijedio/la je Tweet
    prije 14 sati

    Are you interested in serving on the USENIX Security 2021 program committee? Let us know!

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    prije 18 sati

    Do you wanna learn about code (de)obfuscation, SMT-based program analysis, symbolic execution or program synthesis? Then come to my software deobfuscation techniques training at :

    Poništi
  5. proslijedio/la je Tweet
    prije 19 sati

    I dare you to click

    Poništi
  6. proslijedio/la je Tweet
    prije 19 sati

    Recon 2019 video have been released

    Poništi
  7. 6. velj

    Phi nodes are the Schrödinger's cat of program analysis

    Poništi
  8. proslijedio/la je Tweet
    5. velj

    Speaker Highlight: Amy Burnett() will be presenting 'Diverting the Exploit Flow: On Browser Mitigation Effectiveness'

    Poništi
  9. proslijedio/la je Tweet
    5. velj

    If you come to infiltrate this year you can hear her speak live :)

    Poništi
  10. 5. velj

    “For sale: patched exploit, never thrown” - Ernest Heming0day

    Poništi
  11. proslijedio/la je Tweet
    5. velj

    A Haiku wrote an exploit today plan to sell it for millions a collision with p0

    Poništi
  12. proslijedio/la je Tweet
    4. velj

    Friends, has been incredibly generous and have offered to aid us in our malware packaging. Moving forward, we will be introducing changes to our malware set to conform with their naming conventions. Thank you from the bottom of my heart, Polyswarm. I am in your debt.

    Poništi
  13. proslijedio/la je Tweet
    2. velj

    Twitter algorithm crash course: This tells This tells This keeps Twitter them who a post that a will likely visible for post is enjoy it longer engaging 👇 👇 👇

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    3. velj
    Odgovor korisniku/ci

    You can still play it now here:

    Poništi
  15. 2. velj

    Looking forward to using this Yeti thermos. Awesome prize for completing their RE/exploitation challenge at

    Poništi
  16. proslijedio/la je Tweet
    2. velj

    Legend talks (6): My Favorite Things (starts at 2:30)

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    1. velj

    Not having access to your own published paper is peak academia.

    Poništi
  18. 1. velj

    ShmooCon 2020: alum Austin Ralls talks about analyzing Android applications with Binary Ninja

    Poništi
  19. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  20. proslijedio/la je Tweet
    30. sij

    has 151 trainings. We have 18. 18 of the best hacker trainings you can ever find. Early 🐦 prices are still available at ! Register now ➡️ RTs appreciated!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·