Gal Z

@0xgalz

Security researcher. Interested in reverse engineering, C++, Windows internals, sewing, art and classical music. Opinions are my own.

Vrijeme pridruživanja: rujan 2017.

Tweetovi

Blokirali ste korisnika/cu @0xgalz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xgalz

  1. Prikvačeni tweet
    14. sij 2019.

    Finally! I'm releasing my tool,"Virtuailor", it reconstructs C++ vtables in IDA and helps making C++ RE easier! Enjoy! 😀

    Poništi
  2. prije 6 sati

    "Internals & Weaknesses of the DPAPI for the Protection of Our Data on Windows" by a great talk, interesting and fun!

    Poništi
  3. proslijedio/la je Tweet
    24. sij

    Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!

    Poništi
  4. 2. velj
    Poništi
  5. proslijedio/la je Tweet
    31. sij
    Poništi
  6. 30. sij

    My Reverse Engineering C++ Binaries Training will be part of in 😁

    Poništi
  7. 31. pro 2019.

    was awesome! Had a chance to hang out with friends, see interesting talks and had a blast like every year! 🥳

    Poništi
  8. 28. pro 2019.

    That was an interesting talk from "All wireless communication stacks are equally broken", with well written and funny slides 😁

    Poništi
  9. 27. pro 2019.

    Very interesting and technical talk from about iMessage exploitation! If you are not at it's definitely a talk you should watch at home later.

    Poništi
  10. 13. pro 2019.

    Recently, I did some reversing of a kernel object that uses sk_buff; Things to keep in mind when fiddling with Linux Network Stacks: 1. sk_buff changes with every linux kernel version. 2. Writing and compiling a similar code to the one you research really helps. 3. RE is fun!🥳😻

    Poništi
  11. 3. pro 2019.

    If you ever need to define an IDA struct with variable sized length I think you would find this IDA blog useful, and with a small IDAPython script you can set the sizes of the struct in the disassembly for the whole IDB 😁

    Poništi
  12. proslijedio/la je Tweet
    21. stu 2019.

    We just released ghidra-pyi-generator, a tool to generate typing stubs for the Ghidra APIs. Grab the stubs from our release, and get autocompletion & docs inside PyCharm.

    Poništi
  13. proslijedio/la je Tweet
    23. stu 2019.

    My training in HITB SecConf in Amsterdam is now available! I'll be giving a 70% lab time practical intro to vulnerabilities, embedded security, exploits and mitigation. See you there!

    Poništi
  14. 22. stu 2019.
    Poništi
  15. proslijedio/la je Tweet
    21. stu 2019.

    My blogpost series on setting up a full development environment for is now available at They cover both writing scripts and extending Ghidra in Java including full debugging support without Eclipse.

    Poništi
  16. proslijedio/la je Tweet
    16. stu 2019.
    Poništi
  17. 28. lis 2019.
    Poništi
  18. 26. lis 2019.

    What every player dreams of! 🤯🧝🏻‍♂️🤩

    Poništi
  19. proslijedio/la je Tweet
    17. lis 2019.

    in the news: “... Unlike most tools out there this tool has zero impact on a running process. It can simply run against core dump files ... Chap can correctly account for all memory usage and provide deep analysis ...”

    Prikaži ovu nit
    Poništi
  20. 19. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·