Tweetovi

Blokirali ste korisnika/cu @Dor00tkit

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Dor00tkit

  1. Prikvačeni tweet
    27. velj 2019.
    Poništi
  2. proslijedio/la je Tweet
    20. sij

    The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr as Hypervisor From Scratch could never have existed without his help and to Alex for patiently answering my questions.

    Poništi
  3. proslijedio/la je Tweet
    27. pro 2019.

    Practical reverse engineering is an awesome book with insightful windows kernel exercises - I decided to complete all of the exercises and post complete write-ups to my solutions 😛🥳 Here's the first one: Reversing AuxKlibQueryModuleInformation

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  5. proslijedio/la je Tweet
    27. stu 2019.

    My new research on Dtrack - An analysis of the droppers (I found out that one of them is similar to BackSwap's droppers) and the variant that attacked Kudankulam Nuclear Power Plant (KNPP)

    Poništi
  6. proslijedio/la je Tweet
    17. kol 2019.

    Applied Reverse Engineering Series [In-depth articles covering RE topics]

    Poništi
  7. proslijedio/la je Tweet
    15. kol 2019.

    My Second CVE :) LPE in Trend Micro Password Manager (A service which is deployed with the AV) -2019-14684. it was great working with you.

    Poništi
  8. proslijedio/la je Tweet
    17. srp 2019.

    Local Privilege Escalation on most Dell machines running Windows

    Poništi
  9. proslijedio/la je Tweet
    8. srp 2019.

    And that's how you learn to reverse engineer: working through line by line, looking at instruction set architectures (ISA), until it becomes clear what the code does, and then you know that pattern. So next time you see the same pattern, you won't have to go line by line. 5/7

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    12. lip 2019.

    Drop by Drop - my new research on 10 different droppers of Formbook - written in several programming languages and utilizing a substantial amount of Anti-Analysis techniques:

    Poništi
  11. proslijedio/la je Tweet
    7. ožu 2019.

    Let's build a community! Please tag us on tips tweets or any other related post and we'll RT and give credit. Our goal is to make GHIDRA more popular and maintained by the community. Please RT.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·