LolyRoP

@LolyRoP

Revesing and exploiting is fun .. fuzzing too :-)

Vrijeme pridruživanja: srpanj 2011.

Tweetovi

Blokirali ste korisnika/cu @LolyRoP

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @LolyRoP

  1. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  2. 30. sij

    i never looked at the but when i did and looked for security exploit companies () i seen the prices back than.. I wonder what are the prices today...

    Poništi
  3. 28. sij

    peach fuzzer of tutorials are now not available online anymore (403) ... anyone saved "web crawler " of all peach community tutorials of v3 .net and/or v2.3 python ?

    Poništi
  4. proslijedio/la je Tweet
    26. sij
    Odgovor korisnicima

    With Alex’s permission, we could release the version that we made before founding ToB. There are videos from when we turned it into a class at NYU in 2012ish, may be newer versions as well. You should talk to ToB about it, I won’t talk to them anymore.

    Poništi
  5. proslijedio/la je Tweet
    25. sij

    GDA is a Dalvik bytecode decompiler written in C++. It supports APK, DEX, ODEX and OAT files. Looks really cool, especially if you don't have JEB, but it's not open source yet.

    Poništi
  6. proslijedio/la je Tweet
    23. sij
    Odgovor korisnicima
    Poništi
  7. proslijedio/la je Tweet
    20. sij
    Odgovor korisnicima

    Prevention against Physical version downgrade was added starting Cannon point PCH (CSME 12) as explained during our black hat talk

    Poništi
  8. proslijedio/la je Tweet
    3. sij

    The video of the talk we gave at Black Hat USA 2019 is now available on YouTube:

    Poništi
  9. proslijedio/la je Tweet
    13. stu 2019.

    Amazing effort through all teams in ! “67 of the 77 vulnerabilities we are addressing were internally found by Intel”

    Poništi
  10. proslijedio/la je Tweet
    7. stu 2019.
    Poništi
  11. 22. lis 2019.

    if one finds a bug in a stack buffer overflow but it's not exploitable due to stack canary/guard in place (statistical mitigation) , is it still eligible for security bug bounty or external bug bounty i.e.: ? how much will be paid for such report?

    Poništi
  12. proslijedio/la je Tweet

    A new blog from details the hardware setup for reversing a TL-WR841N wireless router. Read all about it (and see the many pics) at

    Poništi
  13. proslijedio/la je Tweet
    25. kol 2019.
    Poništi
  14. proslijedio/la je Tweet
    18. kol 2019.

    This is old and have many holes in the implementation but could be effective if done right... (hmm.. Let me see if I can do it as Xor-F-CFI)

    Poništi
  15. proslijedio/la je Tweet
    8. kol 2019.

    Slides for our talk "Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller" by Alex Gazet and at

    Poništi
  16. 8. kol 2019.

    Any one have the slides/ pictures taken?

    Poništi
  17. proslijedio/la je Tweet
    17. srp 2019.

    Another great research in firmware security by research team. How BMC firmware with missing basic protections and command injection vulnerability ended up in servers of multiple manufacturers years after

    Poništi
  18. proslijedio/la je Tweet
    15. srp 2019.
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    15. lip 2019.

    I ported the vscode dark theme to IDA 7.3 real quick.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    [RELEASE] Here is my psp parsing library, writen in Go: Feel free to take it apart or tell me about go best practices so i can improve it :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·