Tweetovi

Blokirali ste korisnika/cu @JavierYusteM

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JavierYusteM

  1. proslijedio/la je Tweet
    28. sij

    1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    17. sij

    This weekend we have to re-read these posts about Russian Cyber Intelligence Community from ...and also we have to hang this picture. Don't ask us why...

    Poništi
  3. proslijedio/la je Tweet

    People giving career advice should specify the sample that it's based on. Human nature is to overgeneralize from personal experience, so most advice should be considered suspect for being based on a sample size of 1. That's why there's so much conflicting advice on any topic.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    3. sij

    My thanks to ⁦⁩ for his kind coverage of my upcoming book, The Hacker and the State. It’s exciting to release the book at a moment when cyber operations seem more poised than ever to shape international affairs—for better or for worse.

    Poništi
  5. proslijedio/la je Tweet
    12. pro 2019.

    All 's IDA scripts have (finally) been ported to Ghidra. Woohoo!

    Poništi
  6. proslijedio/la je Tweet
    28. stu 2019.

    Somehow I missed there's a whole Ph.D. thesis on symbolic abstraction: Looks pretty readable, too.

    Poništi
  7. proslijedio/la je Tweet

    When the news broke about BlueKeep exploitation in the wild, most of the reactions were basically "it's not a worm, so it doesn't matter". I decided I'd do a thread on why that's wrong, and why a worm isn't even a worst case scenario. THREAD:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    4. stu 2019.

    Is there interest for something like Lumina for Ghidra? A script that sends FID hashes as queries to a server which returns a function name and signature. An additional script that allows uploading local FID hashes with associated function names and signatures.

    Poništi
  9. proslijedio/la je Tweet
    21. lis 2019.

    Pushed the results of the 160GiB libc collection analysis project to The repo now contains Function ID hashes for almost 1M functions. 959055... so close. Anything more to add? More compiler libraries?

    Poništi
  10. 30. ruj 2019.

    Does adding Microsoft uris bypass something?

    Poništi
  11. proslijedio/la je Tweet
    15. kol 2019.

    Evasive attacks on ML classifiers are scary but we know little about adversarial ML in the problem space: we may need to rethink the whole formalization, incl. optimization and constraints for a principled approach - come and talk to us poster session

    Poništi
  12. proslijedio/la je Tweet
    3. kol 2019.

    I just presented my Ghidra plugin at and pressed the “publish” button in github. Enjoy!

    Poništi
  13. proslijedio/la je Tweet
    31. srp 2019.

    Automated Deobfuscation of Android Native Binary Code

    Poništi
  14. proslijedio/la je Tweet
    31. srp 2019.

    During the USA 2019 Mobile App Security Training we're releasing a plug-in for Ghidra that starts a r2web server and lets multiple r2 instances interact with it. Stay tuned!

    Poništi
  15. proslijedio/la je Tweet
    9. srp 2019.

    Researching obscure architectures sounds challenging to you? We thought so too, so we developed a disassembly and analysis plugin for to make things easier! Read on to learn how we did it.

    Poništi
  16. proslijedio/la je Tweet
    28. lip 2019.

    We created a list of community plugins and scripts for Cutter 😎 From malware analysis to code coverage visualizers. Check it out @ We invite you to write more plugins for Cutter following our documentation:

    Poništi
  17. proslijedio/la je Tweet
    24. tra 2019.

    My new article has just been published! 🚀 Deobfuscating the graphs of Ocean Lotus' (APT32) malware using Cutter and radare2 Python plugins. Check it out @ |

    Poništi
  18. 21. velj 2019.

    Fixing a bug after 48 hours of pain feels so relieving

    Poništi
  19. 6. velj 2019.
    Poništi
  20. proslijedio/la je Tweet
    28. pro 2018.

    🚀 Quick Tips For Unpacking 🚀 Made a quick video tutorial covering how to unpack this sample with a few breakpoints and OllyDbg. We are huge fans of ID-Ransomware, keep up the good work Michael!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·