Mathieu RENARD

@GotoHack

Security researcher / iOS / Embedded systems / Hardware Attacks / Forensics / Wookey / Leia

Vrijeme pridruživanja: listopad 2010.

Tweetovi

Blokirali ste korisnika/cu @GotoHack

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @GotoHack

  1. proslijedio/la je Tweet
    5. velj

    checkra1n for Linux is now available at ! 🌧️📲 It’s been months of hard work in the making and we’re so glad to finally show it to you.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Alright, baseline is up and running: booted provided prebuilt bitstream and images! Small tweak to lxterm needed, will prepare patch while I travel.

    Poništi
  3. proslijedio/la je Tweet
    18. sij

    New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    16. sij

    📢 3 days left for early bird tickets! ⏳ Get also an extra 10% off by using the code "TWITTER".

    Poništi
  5. proslijedio/la je Tweet
    27. pro 2019.

    Practical reverse engineering is an awesome book with insightful windows kernel exercises - I decided to complete all of the exercises and post complete write-ups to my solutions 😛🥳 Here's the first one: Reversing AuxKlibQueryModuleInformation

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    14. sij

    Awesome Forensics Resources : Almost 300 open source forensics tools and 600 blog posts about forensics &1000+ Github Repos about Security Resource Collection :

    Poništi
  7. proslijedio/la je Tweet
    14. sij

    My talk on breaking TrustZone-M on a variety of ARMv8-M processors can now be watched here:

    Poništi
  8. proslijedio/la je Tweet
    12. sij

    First Post of the year! Glitch the Nuvoton M2351 MKROM and its crypto. This MCU is based on Cortex-M23 (TrustZone-M) and dedicated to IoT security: 💅💅💅

    Poništi
  9. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  11. proslijedio/la je Tweet
    6. sij

    Congrats on new RISC-V out-of-order superscalar processor RSD from

    Poništi
  12. proslijedio/la je Tweet
    6. sij
    Poništi
  13. proslijedio/la je Tweet

    Happy new decade! (v1) is officially decommissioned for good as (LXR) gets new & improved codesign capabilities, leaving ldid in dust! --stripsig, +ent=(comma separated ents or filename), JENTS=(ents to add to any signature) and more!

    Poništi
  14. proslijedio/la je Tweet
    31. pro 2019.

    New post about Rust on STM32L0 micros!

    Poništi
  15. proslijedio/la je Tweet
    1. sij

    Et voici le tout premier épisode de 2020 consacré à l'anatomie détaillée d'un calculateur habitacle automobile (BSI) jusqu'au plus profond de ses entrailles... 😊🧐

    Poništi
  16. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  17. proslijedio/la je Tweet
    31. pro 2019.

    Slightly late, but here's the slides to my talk: . Contains some useful bonus slides and links, somewhere in the next few days I will add more references to prior work on this subject.

    Poništi
  18. proslijedio/la je Tweet
    30. pro 2019.

    If you want to watch the 36c3 session about checkra1n, the recording is available at:

    Poništi
  19. proslijedio/la je Tweet
    30. pro 2019.

    Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.

    Poništi
  20. proslijedio/la je Tweet
    30. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·