ExiaHan

@ExiaHan

Security Researcher (aka. Todd Han in Trend Micro) 奶牛(NENU),南七(USTC)。。Freedom!!!!

Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @ExiaHan

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ExiaHan

  1. proslijedio/la je Tweet
    29. sij

    Another tool we will share in BH, this one is to analyze the vulnerabilities within apks.

    Poništi
  2. proslijedio/la je Tweet

    Kobe Bryant, despite being one of the truly great basketball players of all time, was just getting started in life. He loved his family so much, and had such strong passion for the future. The loss of his beautiful daughter, Gianna, makes this moment even more devastating....

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    18. sij

    Automatically generating solutions to a corrupted keygenme with , using for the analysis. Cutter and angr are incredibly powerful and useful tools for solving this type of challenge

    Poništi
  4. 16. sij
    Poništi
  5. proslijedio/la je Tweet
    12. sij

    We spotted an attack in the wild that uses CVE-2019-2215, a in Android. Find out how this attack works, and how you can defend against it:

    Poništi
  6. proslijedio/la je Tweet
    15. sij
    Poništi
  7. proslijedio/la je Tweet
    15. sij

    Version 3.5 is out with the Ghidra decompiler integrated in Carbon (no Ghidra or Java installation necessary). The decompiler features navigation, comments and renaming of functions, labels and variables. Happy hacking!

    Poništi
  8. 14. sij
    Poništi
  9. proslijedio/la je Tweet
    11. sij
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    11. sij

    Karonte - A Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

    Poništi
  11. proslijedio/la je Tweet
    11. sij
    Poništi
  12. proslijedio/la je Tweet
    11. sij

    Close to releasing the first version of Carbon with the Ghidra decompiler. Just built on Linux and seems to work nicely! Few days and it should be good to go... ;)

    Poništi
  13. proslijedio/la je Tweet
    13. sij

    It's time to change your password, friends Crazy world. https[:]//xposedornot.com/xposed

    Poništi
  14. 13. sij
    Poništi
  15. proslijedio/la je Tweet
    12. sij

    Citrix Netscaler AMIs on default vulnerable out of the box. The root password is set to the instance ID; that can be read from the metadata URL. CVE-2019-19781 from nobody to ssh as root in seconds.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    10. sij
    Poništi
  17. proslijedio/la je Tweet
    10. sij

    Android: ashmem readonly bypasses via remap_file_pages() and ASHMEM_UNPIN

    Poništi
  18. proslijedio/la je Tweet
    9. sij
    Poništi
  19. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  20. proslijedio/la je Tweet
    9. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·