Tweetovi

Blokirali ste korisnika/cu @Grojcig

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Grojcig

  1. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  2. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  3. proslijedio/la je Tweet
    10. sij
    Poništi
  4. proslijedio/la je Tweet
    7. sij

    First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Group sample: download /xxxx.net/pages/1/file C2 mod, Github display it. /xxx.net/202/xxx report:

    Poništi
  5. proslijedio/la je Tweet
    3. sij

    Reverse Engineering Encrypted Code Segments: by Ryan Cornateanu

    Poništi
  6. proslijedio/la je Tweet
    21. pro 2019.

    Reverse Engineering a real world 249 bytes backdoor!

    Poništi
  7. proslijedio/la je Tweet
    18. pro 2019.

    Frida 12.8 is out 🎉 Not only can NativeFunction calls be followed with ability to mutate their instruction streams on a per thread basis, but also ObjC and Java calls. We now also support direct memory access through brand new ArrayBuffer APIs.

    Poništi
  8. proslijedio/la je Tweet
    19. pro 2019.
    Poništi
  9. proslijedio/la je Tweet
    9. pro 2019.

    I wrote a guide for beginners about windows library code:) In this guide I describe how the compilation and linkage model works in windows at the assembly level - static and dynamic libraries, etc. Have fun 🙃

    Poništi
  10. proslijedio/la je Tweet
    2. pro 2019.

    Android vulnerability Vulnerability allows malicious app to masquerade as any other app on the device. So, if you launch Facebook, malware is executed. See video demo how it works.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    11. stu 2019.
    Poništi
  12. 27. kol 2019.

    com[.]antiviruscleaner[.]masterbooster[.]superturbovpn[.]tools <- you can't go wrong marketing your malware using this package name. I only miss .freeinternet.verysecure.2019 from the name :D

    Poništi
  13. proslijedio/la je Tweet
    19. kol 2019.

    "Paged Out!" is a new zine that focuses on "micro articles". Just looking at the table of contents gets me excited. First issue: Makes me wish I was back in highschool with all the time in the world to just explore and screw around. Curse you, adult life!

    Poništi
  14. proslijedio/la je Tweet
    26. srp 2019.

    What's the oxymoron here? Surveillance ... More in the picture 🧐 n/n

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    3. srp 2019.

    Here are slides from my @DCBerlin19 presentation: Kotlin not-to-do list

    Poništi
  16. proslijedio/la je Tweet
    3. srp 2019.

    Respect abstraction contract and don't do this at home! 😂

    Poništi
  17. proslijedio/la je Tweet
    17. velj 2019.

    apkfile - Android app analysis and feature extraction library

    Poništi
  18. proslijedio/la je Tweet

    FBI is in front of your house...

    Poništi
  19. proslijedio/la je Tweet

    That string encryption though... How does one bypass such an intense defense mechanism?!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·