Tweetovi

Blokirali ste korisnika/cu @__z0ey__

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @__z0ey__

  1. proslijedio/la je Tweet
    prije 10 sati
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  3. proslijedio/la je Tweet
    26. sij
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  5. proslijedio/la je Tweet
    16. sij

    My favorite articles are the ones that walks you through the author methodology and strategy to find/exploit bugs. This is the case for last post on Chrome IPC vulnerabilities:

    Poništi
  6. proslijedio/la je Tweet
    15. sij

    Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator cc:

    Poništi
  7. proslijedio/la je Tweet
    15. sij

    ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware

    Poništi
  8. proslijedio/la je Tweet
    15. sij
    Poništi
  9. proslijedio/la je Tweet
    15. sij
    Poništi
  10. proslijedio/la je Tweet
    14. sij

    AndroidKnowledgeSystem : The most complete Android advanced route knowledge map :

    Poništi
  11. proslijedio/la je Tweet
    10. sij

    new blog post: Testing Dataflow Analyses for Precision and Soundness summarizes a new paper lead by

    Poništi
  12. proslijedio/la je Tweet
    11. sij

    Interesting project to learn about OS internals and Rust: Writing an Os in Rust

    Poništi
  13. proslijedio/la je Tweet
    10. sij

    A Graduate Course in Applied Cryptography (Rev 2020) : (pdf)

    Poništi
  14. proslijedio/la je Tweet
    10. sij

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Poništi
  15. proslijedio/la je Tweet
    9. sij

    If anyone interested in modifying an Android app (.apk) and recompiling it again, check out my write up about a CTF style challenge I solved recently:

    Poništi
  16. proslijedio/la je Tweet
    7. sij
    Poništi
  17. proslijedio/la je Tweet
    4. sij

    An effort to build a single place for all useful android and iOS security related stuff.

    Poništi
  18. proslijedio/la je Tweet
    3. sij

    🚀 Launch Day 🚀 It’s official this project that and I have been a part of for 5 years is now available as a free public Beta! Automated malware unpacking!

    Poništi
  19. proslijedio/la je Tweet
    1. sij

    A collection of Linux kernel KASLR bypasses made by

    Poništi
  20. proslijedio/la je Tweet
    30. pro 2019.

    VdexExtractor 0.6.0 released with Android 10 support. Seems that new 021 version has minor changes to support Vdex files generated from InMemoryDexClassLoader. To worry about perf there, G seems to invest a lot on it. |

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·