Evilcry_

@Blackmond_

Partime Garbage Collector - Reverse Engineering hobbyist.

Vrijeme pridruživanja: veljača 2011.

Tweetovi

Blokirali ste korisnika/cu @Blackmond_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Blackmond_

  1. 4. velj

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    Seems that league of legends has an anti cheat kernel driver now - interesting to find out what will do -

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    Possible APT34 domain lebanonbuilder[.]com was registered on 2/2 through THCservers using cd.redel@protonmail[.]com and is hosted on a probable dedicated server at 23.106.160[.]127. In :

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Ever wanted to take a peek at the mimikatz sekurlsa::msv internals? New blog post is all about it plus, it also showcases PyKDumper, a tool that dumps LSASS credentials through WinDBG/PyKD.

    Poništi
  5. 2. velj

    Getting in the Zone: dumping Active Directory DNS using adidnsdump

    Poništi
  6. 2. velj
    Poništi
  7. 2. velj

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers

    Poništi
  8. 2. velj
    Poništi
  9. proslijedio/la je Tweet
    1. velj

    Apple’s continuity protocol reverse enginered:

    Poništi
  10. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  11. 1. velj
    Poništi
  12. proslijedio/la je Tweet
    31. sij
    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Reversing XignCode3 Anticheat – Registering Notify and Callback Routines Part 4.1 is out! 🤯 Anti-cheats use callbacks and notification routines to control what is happening on your system, let's dig into this

    Poništi
  14. proslijedio/la je Tweet
    31. sij

    New paper & presentation: Rich headers: leveraging the mysterious artifact of the PE format - by researchers Peter Kálnai and Michal Poslušný

    Poništi
  15. proslijedio/la je Tweet
    31. sij

    : researchers uncover a new campaign by the , known for attacks against various high-profile targets. This time, the WinntiGroup took aim at Hong Kong universities.

    Poništi
  16. proslijedio/la je Tweet

    I pushed my intel FSP header parsing library: It includes a tool to dump your flashimages fsp images. Also the printing code is shamelessly stolen from s tiano fsp parser. Thanks man!

    Poništi
  17. proslijedio/la je Tweet
    30. sij

    This comprehensive TA505 report is epic. Shout out to . English version coming soon. Stay tuned!

    Poništi
  18. proslijedio/la je Tweet
    30. sij

    New content has been added. -Discord Spidey Bot malware source code leak -Mocoh Poly engine by -Advanced Metamorphic Techniques in Computer Viruses 1luv

    Poništi
  19. 31. sij
    Poništi
  20. proslijedio/la je Tweet
    30. sij
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·