StrikeBhack

@StrikeBhack

Interested in low-level stuff, OS and binary internals, reverse engineering, malware analysis, etc.

Vrijeme pridruživanja: siječanj 2015.

Tweetovi

Blokirali ste korisnika/cu @StrikeBhack

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @StrikeBhack

  1. proslijedio/la je Tweet
    prije 21 sat

    Do you have an open-source cybersecurity project you would like to see being worked on as part of Google Summer of Code? We are collecting ideas & projects for this summer! Submit yours here (even if you wouldn't be able to be a mentor): !

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    I am quite exhausted from the sheer complexity of the research I have been doing, having just spoken about the ME at . Now it's your turn: Please look into it as well and post your follow-up insights! ✨👩🏻‍💻 Slides: Video will follow.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Google loves security keys, and today announced an open source implementation to help spur further innovation from the security research community 1/ .

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    24. sij

    L’obtention de privilèges élevés sur l’ peut entrainer la prise de contrôle complète d'un Le service Active Directory Security (ADS) de l'ANSSI accompagne la sécurisation des annuaires AD des acteurs critiques (OIV, OSE & administrations)

    Poništi
  6. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  7. proslijedio/la je Tweet
    23. sij

    Extremely thrilled to launch today. Thanks for everyone supporting this initiative. Together we will 👊

    Poništi
  8. proslijedio/la je Tweet
    24. sij

    CERTFR-2020-AVI-056 : Multiples vulnérabilités dans le noyau Linux de Red Hat (24 janvier 2020)

    Poništi
  9. proslijedio/la je Tweet
    23. sij

    Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:

    Poništi
  10. proslijedio/la je Tweet
    23. sij

    [BLOG] Focus on the architecture of the Linux random number generator, also known as /dev/urandom. How does it work? Is it secure? All those questions and more are answered in our blog post : read it !

    Poništi
  11. proslijedio/la je Tweet
    22. sij

    We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!

    Poništi
  12. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  13. proslijedio/la je Tweet
    18. sij

    "Accelerated Windows Debugging 3, Second Edition" book is now available on Leanpub

    Poništi
  14. proslijedio/la je Tweet
    16. sij

    Very much looking forward to this talk: "Hypervisor-level malware monitoring and extraction system - current state and further challenges" with DRAKVUF !

    Poništi
  15. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    14. sij

    ⚠️Alerte CERT-FR⚠️ CERTFR-2020-ALE-004 : Vulnérabilité d’usurpation d’identité dans Windows CryptoAPI (14 janvier 2020)

    Poništi
  17. proslijedio/la je Tweet
    14. sij

    ⚠️Alerte CERT-FR⚠️ CERTFR-2020-ALE-005 : Multiples vulnérabilités dans le serveur de passerelle RDP de Windows (14 janvier 2020)

    Poništi
  18. proslijedio/la je Tweet
    14. sij

    👋 hey twitter! Meet Shawki Sukkar (), a 16yo self-taught developer from Aleppo, Syria I want you to help him find a job or internship in Canada, so he can move here and continue his career and education in a safe environment

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    14. sij

    UEFI_RETool with IDA plugin now only work on python3:

    Poništi
  20. proslijedio/la je Tweet
    14. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·