Giovanni

@Der0ad

Dev, crypto and on free time contributor

Vrijeme pridruživanja: ožujak 2010.

Tweetovi

Blokirali ste korisnika/cu @Der0ad

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Der0ad

  1. Prikvačeni tweet
    5. lis 2019.

    Reminder for myself: do one project at a time.

    Poništi
  2. proslijedio/la je Tweet
    30. sij
    Poništi
  3. proslijedio/la je Tweet

    Buon virus a tutti

    Poništi
  4. proslijedio/la je Tweet
    9. sij

    Announcing BLAKE3! 🥳 * Faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2 * Merkle tree: unlimited parallelism, verified streaming * Builtin MAC, KDF, XOF * One algorithm, no variants * Rust crate: Try it: cargo install b3sum

    Poništi
  5. 6. sij

    Today i finally release a disassembler for the Machine Code 7 (MC7) bytecode used in Siemens Step 7 PLCs (S7-300 and S7-400). The library can be used with radare2 (via `r2pm install libmc7`)

    Poništi
  6. 1. sij

    Happy new year!

    Poništi
  7. proslijedio/la je Tweet
    31. pro 2019.

    If you don't want to celebrate new year eve.. you can always celebrate that today Python dies a bit 🎉 🎉 🎉

    Poništi
  8. proslijedio/la je Tweet
    27. pro 2019.

    That moment when both and are the very first News Report on Germans biggest TV Newscast today 😉

    Poništi
  9. 27. pro 2019.

    Nvm. She lost you xD

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    26. pro 2019.

    We got our emulation assembly at ! Feel free to visit and grab a drink with us. Glad to have such awesome neighbors too: KJC, Nintenbros and fail0verflow.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    15. pro 2019.

    If you want to learn about post-quantum and/or isogeny based cryptography then I have just the right talk for you: Also, join us at the assembly if you are into hacking game consoles. We will make sure to bring some stuff with us!

    Poništi
  12. 5. pro 2019.

    And yes, written in native java and no deps are required. you can build it by yourself via netbeans or download the pre-built jar in the release page.

    Prikaži ovu nit
    Poništi
  13. 5. pro 2019.

    So in the past days i had to use burp for a pentest and i needed to decode raw protobuf. Now there is a plugin for it but it REQUIRES Jython (150 MB) only to decode a damn protobuf. so i wrote one: it's 37 KB. Enjoy

    Prikaži ovu nit
    Poništi
  14. 25. stu 2019.

    Easy, which curve is safe in ECC (NIST and non-NIST ones)

    Poništi
  15. 15. stu 2019.
    Poništi
  16. proslijedio/la je Tweet
    13. stu 2019.

    Part 1 of my articles explaining how 's exploit of the Intel ME works and how to JTAG a skylake's ME and control its USB devices via the ME :

    Poništi
  17. proslijedio/la je Tweet
    14. stu 2019.

    Hot on the heels of the first part of my "Exploiting Intel's Management Engine" series of articles, here is part 2, porting to ME 11.x : Includes release of the ME 11.x exploit and an MFS manipulation tool.

    Poništi
  18. proslijedio/la je Tweet
    11. stu 2019.
    Poništi
  19. 6. stu 2019.

    Today I've release for raw protobuf decoding. It's quite easy to use, just type pFb @ 0x1234 and it will print the decoded protobuf.

    Poništi
  20. proslijedio/la je Tweet
    30. lis 2019.

    Another one of my 'let me teach you something' blog posts.. after the ECDSA post, and the intro to reverse engineering and assembly, here's one on how computers work : Hopefully, it's an interesting read and was worth dusting it off!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·