panda bear

@0xcpu

A bear of very little brain. I do nothing every day. Chew, chew, chew.

Prague
Vrijeme pridruživanja: lipanj 2016.

Tweetovi

Blokirali ste korisnika/cu @0xcpu

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xcpu

  1. proslijedio/la je Tweet
    27. sij

    we have an update to DTrace on Windows. with the latest 20H1 insider build, no more KD required to use dtrace on windows. plus arm64 MSI.

    Prikaži ovu nit
    Poništi
  2. 13. sij

    This is really fun! Thanks for

    Poništi
  3. proslijedio/la je Tweet
    30. pro 2019.

    Here's my conversation with Donald Knuth, the legendary computer scientist & mathematician. I can imagine no better guest to end the year with than Don, one of the kindest, funniest, and most brilliant people I have ever met. It was an honor beyond words:

    Poništi
  4. proslijedio/la je Tweet
    2. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    Independent rediscovery happens often in our field. Old presentations/blog entries/etc don't get systematized or categorized, so discovering them is left to serendipity. Not sure what it would look like, but we'd all benefit tremendously from some sort of catalog of past research

    Poništi
  5. proslijedio/la je Tweet
    20. pro 2019.

    We just updated the executive callback repo with a research on the callback used by PatchGuard

    Poništi
  6. proslijedio/la je Tweet
    18. pro 2019.

    I have retroactively fixed everybody's complaint about movie hacking/reverse engineering not being realistic.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    12. pro 2019.

    Attention Hackers! We are very excited to announce that a brand new CTF is in town! Together with we are preparing a qualification round on February 1-2, and for the top 10 teams, we will have a final round full of surprises. Stay tuned for updates!

    Poništi
  8. proslijedio/la je Tweet
    22. stu 2019.

    A UNSW Sydney mathematician has cracked a maths problem that has stood for almost half a century which will enable computers to multiply huge numbers together much more quickly.

    Poništi
  9. proslijedio/la je Tweet

    Hey, new uploads to Windows-Insight: - an article on invocations between ci.dll and skci.dll: ; - a WiP paper on a framework for executing Hyper-V hypercalls (this allows fuzzing and testing performance): (code will follow soon!)

    Poništi
  10. proslijedio/la je Tweet
    15. stu 2019.

    I made simple ida pro plugin for parsing kernel resource FUNCTIONEXTENTLIST:

    Poništi
  11. proslijedio/la je Tweet
    5. stu 2019.

    Myself and have been doing a research on Executive Callback Objects. It's still WIP but feel free to contribute or add more info 😃

    Poništi
  12. proslijedio/la je Tweet
    5. stu 2019.
    Poništi
  13. proslijedio/la je Tweet
    25. lis 2019.

    Impressive: Someone wrote a compiler which compiles cheats (for Counterstrike) to use Return-oriented programming, only executing code that is already present in the machine's memory. This is done to try to bypass anticheat engines. Seen at

    Poništi
  14. proslijedio/la je Tweet
    15. lis 2019.
    Odgovor korisnicima

    Fun fact, the checks on the index in PsRegisterAltSystemCallHandler are signed, so you could also register a handler outside the array. :-^

    Poništi
  15. proslijedio/la je Tweet
    14. lis 2019.

    Little research and me did on the new AltSystemCallHandlers functionality added to Windows 10 20H1 18995. Register a handler that gets executed every time KiSystemCall is called, this has a lot of potential!!

    Poništi
  16. proslijedio/la je Tweet
    7. lis 2019.

    I have created a new repo for implementations of cryptoanalysis attacks on AES at The first one is an attack on 5 Rounds AES from our new paper "The Retracing Boomerang Attack" with , Nathan Keller and Adi Shamir ()

    Poništi
  17. proslijedio/la je Tweet
    3. lis 2019.

    [BLOG] Exploring Execution Trace Analysis: digging into automation for trace collection and off-line dynamic trace analysis by Luigi ()

    Poništi
  18. proslijedio/la je Tweet
    30. ruj 2019.

    New Paper: “Practical Decryption exFiltration: Breaking PDF Encryption“ describing new attacks that uncover the plaintext of encrypted PDFs. To be presented at and joint work with . 1/n

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    27. ruj 2019.

    Here's my alternative solution to level 12 of . Required reversing cng.sys

    Poništi
  20. 18. ruj 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·