Aixeiger

@Aixeiger

The difference between man an machine is key

Guadalajara, Mexico
Vrijeme pridruživanja: listopad 2009.

Tweetovi

Blokirali ste korisnika/cu @Aixeiger

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Aixeiger

  1. proslijedio/la je Tweet
    14. sij

    Long time since I've posted something technical on my blog. I figured I should go back to the idea of converting some of the answers to technical questions I get to blog posts, so here we go:

    Poništi
  2. 9. sij
    Poništi
  3. proslijedio/la je Tweet
    8. sij

    ▶️I'll be livestreaming Part 5 of picoCTF 2019 in less than 30 minutes: Already solved 57 challenges, but there seems to be no end to them 🚩🚩🚩...😅

    Poništi
  4. proslijedio/la je Tweet
    3. sij

    The Fuzzing Round Table Video from hosted by and me and featuring and many more. Sorry for the sound, it could be a lot better but is understandable at least.

    Poništi
  5. 2. sij
    Poništi
  6. 2. sij
    Poništi
  7. Poništi
  8. proslijedio/la je Tweet

    PE Import Table hijacking as a way of achieving persistence/exploiting DLL side loading (Christmas blog post 😉):

    Poništi
  9. proslijedio/la je Tweet
    26. pro 2019.

    Any ideas for Masters/Bachelors thesis topics around malware analysis, reverse engineering, low-level security or other infosec topics? Please RT too - I get this question a lot and I always struggle to answer. So I hope to use our community's wisdom and send folks here :)

    Poništi
  10. proslijedio/la je Tweet
    24. pro 2019.

    Reversing Windows Internals (Part 1) - Digging Into Handles, Callbacks and ObjectTypes

    Poništi
  11. proslijedio/la je Tweet
    23. pro 2019.

    Somebody had registered my name on Instagram. In this video I tell the story, how I (elite hacker) gets access to the name. Haxember #23

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    21. pro 2019.

    Reverse Engineering a real world 249 bytes backdoor!

    Poništi
  13. proslijedio/la je Tweet
    20. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    20. pro 2019.

    Reverse Engineering Resource Collection. 3000+ open source tools, ~600 blog posts.

    Poništi
  15. proslijedio/la je Tweet
    9. pro 2019.

    Confirmed: I will be speaking about the ME at the stage, with a bit of focus on and , but also and , to eventually evaluate its and impact. ☝🏻 Save the date: 2019-12-27 17:00 👩🏻‍💻

    Poništi
  16. proslijedio/la je Tweet
    10. pro 2019.

    Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! More than 3000 tools and about 600 posts.

    Poništi
  17. proslijedio/la je Tweet

    SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4

    Poništi
  18. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    4. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    7. pro 2019.

    My exploitation note for cve-2019-0708 () on Win7

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·