Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @YellowbyteRE
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @YellowbyteRE
-
Prikvačeni tweet
Although IDA now has a fix for disassembly desynchronization, the fix inadvertently makes another anti-disassembly technique more stealthy and can also be used to hide instructions. Find out more in this post: https://github.com/yellowbyte/analysis-of-anti-analysis/blob/master/research/the_return_of_disassembly_desynchronization/the_return_of_disassembly_desynchronization.md …
#antianalysis#BinaryNinja#IDAPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
A very well done write up analyzing one of my ELF files.https://binaryresearch.github.io/2019/09/17/Analyzing-ELF-Binaries-with-Malformed-Headers-Part-1-Emulating-Tiny-Programs.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
What is program synthesis, really? Learn about it by building a synthesizer yourself, following the quick-and-easy tutorial by
@siderealed in today's PL Perspectives post: "Building Your First Program Synthesizer"! https://blog.sigplan.org/2019/11/26/building-your-first-program-synthesizer/ …pic.twitter.com/9suEqiMwND
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
Obscurity is a valid layer of defence.https://twitter.com/FiloSottile/status/1198487261421154304 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
https://calwa.re/reversing/obfuscation/binary-deobfuscation-preface … (More to come, it seems) by Cal (@calvinlikesrice ?)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
It's time to share one of my old projects ( about 10 years ago ), implementation of armadillo protectors nanomits technology. Free to use I will share its source code soon... VirusTotal : https://virustotal.com/gui/file/8deab9b213eb4ddd2ec6eff4f9e16e5bcdbef21a6940f2ce9840d8a6f7dc2dce/detection … Download : https://mega.nz/#F!09BAAQhK!y87wd9tDRJ8z0tqfy8mZWQ …
#Protector#Exetools#RCEHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
"Defeating APT10 compiler-level obfuscations"
#VB2019 slides https://www.virusbulletin.com/uploads/pdf/conference_slides/2019/VB2019-Haruyama.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
1.2 is released! The list of new features is so big we split it into multiple blog posts: https://binary.ninja/2019/09/30/1.2-launch.html … And why not throw a new website in the mix too? Let us know if you like the new layout: https://binary.ninja/ pic.twitter.com/xZH2b0GGcc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
SATURN -- Software Deobfuscation Framework Based on LLVM ( nice one by
@fvrmatteo@Blips_and_Chitz ) https://arxiv.org/abs/1909.01752Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
[Blog] Obfuscating Java bytecode with LLVM and Epona Melchior de Roquefeuil writes about his 2-month internship at Quarkslab. Thank you Melchior! https://blog.quarkslab.com/obfuscating-java-bytecode-with-llvm-and-epona.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
Breaking obfuscated programs with symbolic executionhttps://www.slideshare.net/SebastianBanescu/breaking-obfuscated-programs-with-symbolic-execution …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
Example of IDA+Triton plugin in order to extract opaque predicates where their computation is local to a single basic block using a Forward-Bounded DSE.https://github.com/JonathanSalwan/X-Tunnel-Opaque-Predicates …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
"Extended Report on the Obfuscated Integration of Software Protections", by J. Van den Broeck, B. Coppens and Bjorn de Sutter (
@brdsutte) [July 2019] Code: https://github.com/csl-ugent/diablo/tree/oisp … (extension of Diablo, a link-time binary rewriting framework) Paper: https://arxiv.org/pdf/1907.01445.pdf …pic.twitter.com/4aoLdF0FZS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
An antivirus evasion tool from Daniel Sauder (
@DanielX4v3r) uses multiple techniques to bypass Microsoft Defender software with executable files#BHUSAhttps://portswigger.net/daily-swig/evading-antivirus-with-avet …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
[PDF] How to kill Symbolic Deobfuscation for free (Path-Oriented protections) https://arxiv.org/pdf/1908.01549.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
UniTaint is a PoC for a taint based attack on VMProtect. Traces the vmprotected function with unicorn and taints the input using bea disassembler and a custom tainterhttps://github.com/pgarba/UniTaint
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
The last article of the series is out. Covering VM-exit handlers, event injection, and a neat way to handle triple faults in a VMM.https://revers.engineering/day-5-vmexits-interrupts-cpuid-emulation/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
Defeating Commercial and Custom Packers like a Pro - VMProtect, ASPack, PECompact, and more:https://youtu.be/N4f2e8Mygag?t=1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
The DGA of Pitou (Analyzing a Virtualized Algorithm) - great one if you want to learn how a VM based proteciton works https://www.johannesbader.ch/2019/07/the-dga-of-pitou/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
People have requested the slides from my talk at DEF CON China 2019: MODERN MALWARE - OBFUSCATION AND EMULATION; http://www.blackstormsecurity.com/docs/DEFCON_CHINA_ALEXANDRE.pdf … There are few slides about DTrace on Windows. ;)
#defcon#defconchina#hacking#malware#obfuscation#windows#reversingpic.twitter.com/2RzKhMwRix
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yu-Jye Tung proslijedio/la je Tweet
0pack : A novel technique to hide code from debuggers - An ELF x64 binary payload injector written in c++ : https://github.com/Luis-Hebendanz/0pack … ELF Binary Obfuscation : https://github.com/Luis-Hebendanz/0pack/raw/master/0pack-presentation.pdf … (pdf)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
