Tweetovi

Blokirali ste korisnika/cu @MrPr0pre

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MrPr0pre

  1. proslijedio/la je Tweet
    28. sij

    "DFIR ORC was designed for forensic use from the start". presenting the open source tool released by at

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    The 360 Alpha team helped Apple to fix 0-click RCE & memory leak bugs in CoreBluetooth, which could allow attackers near by to remote control any Mac systems with zero interaction.

    Poništi
  3. 28. sij
    Poništi
  4. proslijedio/la je Tweet
    19. sij
    Odgovor korisniku/ci

    In case you want to automate the "force decompile as call" you might want to look at ida_hexrays.udc_filter_t, e.g. here:

    Poništi
  5. proslijedio/la je Tweet
    14. sij
    Poništi
  6. proslijedio/la je Tweet
    17. sij

    Here’s an IDAPython script that I have been using to populate comments and enum constants for Windows Crypto API. I still need to figure out how to search by constants by name, populate enums with multiple values and add more APIs but it’s still useful.

    Poništi
  7. proslijedio/la je Tweet
    13. sij

    In this post, dissects Mimikat'z kernel mode driver, Mimidrv, and walks through some of the capabilities available to us in ring 0. Check it out:

    Poništi
  8. proslijedio/la je Tweet
    12. sij

    BattlEye, a popular anti-cheat, has been detecting unknown cheats by using heuristics in combination with the x86 trap flag. This was done to specifically target "The Perfect Injector" by from usermode.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    13. sij
    Poništi
  10. proslijedio/la je Tweet
    10. sij

    Trustwave SpiderLabs Principal Security Consultant returns with his latest installment in this 3-part series on Windows debugging and exploiting. Read them all on the Trustwave SpiderLabs blog:

    Poništi
  11. proslijedio/la je Tweet
    10. sij

    I just wrote a quick tip to load a DLL into x64DBG

    Poništi
  12. proslijedio/la je Tweet
    11. sij

    Windows Process Injection in 2019 . Nice compilation with functional examples.

    Poništi
  13. proslijedio/la je Tweet
    9. sij

    Project Zero blog: "Remote iPhone Exploitation Part 3: From Memory Corruption to JavaScript and Back -- Gaining Code Execution" by Samuel Groß () --

    Poništi
  14. proslijedio/la je Tweet
    8. sij

    [JOB] [FR] Nous sommes actuellement à la recherche de hunters ! Nous rejoindre c'est faire de la réponse à incidents, de la recherche de compromission et de la recherche et développement. Plus d'infos sur :

    Poništi
  15. proslijedio/la je Tweet
    7. sij

    Welcome to the team :) Yet another  veteran reverser to enforce our incident response and hunting activities 💪 New projects are coming!

    Poništi
  16. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    23. pro 2019.

    Just published a new blog-post >> 5 ways to patch binaries with Cutter 🚀 Yes, you can patch from the decompiler! It's not a long article but it feels great to write again! I missed it. Check it out @

    Poništi
  19. proslijedio/la je Tweet
    15. pro 2019.

    So I translated to myself 's article on Exploitation and the internals of Windows 10 RS5 (Userspace), and Saar suggested I'll upload it for everyone, so why not :) I hope this helps as it helped me, thank you Saar!

    Poništi
  20. proslijedio/la je Tweet
    15. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·