julian

@_SYS_V

我对中国和计算机安全感兴趣

US
Vrijeme pridruživanja: siječanj 2017.

Tweetovi

Blokirali ste korisnika/cu @_SYS_V

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_SYS_V

  1. Prikvačeni tweet
    18. sij

    Automatically generating solutions to a corrupted keygenme with , using for the analysis. Cutter and angr are incredibly powerful and useful tools for solving this type of challenge

    Poništi
  2. 24. sij

    新年快乐,大家!祝你们鼠年吉祥! 虽然春节开始了,在外国学习的中国留学生不可以回家。有一点困难,我觉得。加油!还有,我希望疫情早日结束,也希望感染人都尽快康复

    Poništi
  3. proslijedio/la je Tweet
    20. sij

    Our Research Team has recently found newer undetected variants of , a Trojan initially discovered in 2015 with a complex authentication mechanism. Read the technical analysis by

    Poništi
  4. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    15. sij

    Ghidra Script that sets the names for missing function names by looking for relevant patterns in the binary! Hope that will help you too :)

    Poništi
  6. proslijedio/la je Tweet
    14. sij

    Ruckus vulnerability research by is now online, several critical vulnerabilities found. Check it out:

    Poništi
  7. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  8. proslijedio/la je Tweet
    10. sij

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Poništi
  9. proslijedio/la je Tweet
    2. sij

    Starting 2020 with a major website update @ and 3 new pwn challenges from & ! Enjoy!

    Poništi
  10. proslijedio/la je Tweet
    31. pro 2019.

    Hey All! Here's a link to the slides for the talk at 2019: Enjoy. Happy New Year!

    Poništi
  11. proslijedio/la je Tweet
    23. pro 2019.

    Our latest blog, Mozi, another botnet uses DHT protocol targeting weak telnet password and 11 different vulnerabilities

    Poništi
  12. 25. pro 2019.

    圣诞节快乐,大家!Merry Christmas everyone

    Poništi
  13. proslijedio/la je Tweet
    20. pro 2019.

    Cutter v1.10 now has a DEBUGGER! 🐞🥳 After a lot of work, we are so happy to announce that we finally implemented your most requested feature. The beta version of the debugger is available NOW on our website >> List of features and what's coming next >>

    Prikaži ovu nit
    Poništi
  14. 14. pro 2019.

    对了,我应该告诉你们 - 如果你在中国, 想看我博客的内容的话,我推荐你用一个VPN,因为有的文章里的程序是 gists,好像在中国你们不能下载在 gist.github. com 的代码。我不确定为什么。

    Poništi
  15. 14. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    12. pro 2019.

    Folks, here's why you should follow : 18 years (!) on , speaker, amazing forward and reverse engineer, superb instructor. Check out his talk:

    Poništi
  17. proslijedio/la je Tweet
    12. pro 2019.

    All 's IDA scripts have (finally) been ported to Ghidra. Woohoo!

    Poništi
  18. proslijedio/la je Tweet
    11. pro 2019.

    Understand attack surface of statically linked binaries in Linux and learn how to harden them

    Poništi
  19. proslijedio/la je Tweet

    Today’s mission was a complete success. We moved closer towards verifying for human flight. This was the 6th flight for this booster (a record), and the 100th commercial payload customer was on board with thousands of postcards

    Poništi
  20. proslijedio/la je Tweet
    10. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·