Sebastian Muniz

@_topo

Security researcher, hardware crasher and some other useless characteristics in real life.

Buenos Aires, Argentina
Vrijeme pridruživanja: ožujak 2009.

Tweetovi

Blokirali ste korisnika/cu @_topo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_topo

  1. proslijedio/la je Tweet
    26. pro 2019.

    Great stuff to recover symbols for all those embedded Linux kernels I wrote a script for this long ago but it became outdated and required unpacking the kernel first. This one looks much nicer and up-to-date (check the history write-up in the comments!)

    Poništi
  2. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  3. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  4. proslijedio/la je Tweet
    9. pro 2019.

    I was looking through some old private repos and realized I never open-sourced my msp430 symbolic execution engine. It solves the first handful of challenges from microcorruption totally automatically:

    Poništi
  5. proslijedio/la je Tweet
    23. stu 2019.

    Amazing and also terrifying. Open source project that can clone a voice in 5 seconds to generate arbitrary speech in real-time.

    Poništi
  6. proslijedio/la je Tweet
    29. stu 2019.

    How to extend IDA to support debugging for more processors: As you see, it is a piece of cake once you know the basics :)

    Poništi
  7. proslijedio/la je Tweet
    22. stu 2019.

    Just published my scripts to reconstruct Microsoft COM-Code. Tested on v7.4 and Python v2+3 => Happy reversing!

    Poništi
  8. proslijedio/la je Tweet
    18. stu 2019.

    The $8 FPGA board: Reverse Engineering the Cisco HWIC-3G-CDMA. Cyclone II FPGA with 35K logic elements, 32MB DDR SDRAM, a USB host controller, and PCI Express Mini card.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    18. stu 2019.
    Poništi
  10. proslijedio/la je Tweet
    13. stu 2019.

    Last and FATAL HW exploit on ESP32. Using this, an attacker is now able to decrypt the firmware and install its own (encrypted) malware PERSISTENTLY. No Fix on current ESP32 , vuln is here forever 😮 Enjoy:

    Poništi
  11. proslijedio/la je Tweet
    11. stu 2019.

    An huge collection of IDA plugins. We should and will create our own repository one day:

    Poništi
  12. proslijedio/la je Tweet

    The USB armory Mk II schematics and PCB layout are now published at: Also remember that while the pre-order campaign ended on November 1st, you can still purchase one at:

    Poništi
  13. proslijedio/la je Tweet
    6. stu 2019.

    💥🌟 is now public! 💥🌟 More to come in the upcoming days, but visit the following repo for all your needs with GPU accelerated Signal.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    4. stu 2019.

    After more than half a year of work, check out our latest paper Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems. More details at Joint work with Takeshi Sugawara, Benjamin Cyr, Daniel Genkin, and

    Poništi
  15. proslijedio/la je Tweet
    29. lis 2019.

    MarmotE, the 2nd place winners of 's SC2 grand challenge, has pushed public their GNU Radio-based radio design! This is an amazing contribution to the community 😃

    Poništi
  16. 29. lis 2019.

    Hey Twitterverse! What are the coolest security companies to work remotely as a reverse engineer / security researcher nowadays (hardware hacking is a plus) ? ⁉️🤓🙄

    Poništi
  17. proslijedio/la je Tweet
    28. lis 2019.

    [PoC] CVE-2019-11932 Whatsapp 2.19.216 Remote Code Execution 1. set the listner ip (nc -lvp 5555) 2. run ./exploit and save the content to .gif 3. exploit.gif file and send it as Document with WhatsApp to another WhatsApp user

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    10. lis 2019.

    The 36 pages of reverse-engineered schematics for the original Game Boy chip (minus CPU) are on Github:

    Poništi
  19. proslijedio/la je Tweet
    5. lis 2019.

    If you need a fast/light way to instrument and save each instruction (with general purpose & r/e flags) in all levels of execution (User-mode/Kernel-mode/Hypervisor) then use my new customized version of QEMU.

    Poništi
  20. proslijedio/la je Tweet
    2. lis 2019.

    We are pleased to announce the release of our third collection - TL-BOTS. This 1.3GB collection contains source code for a large number of Botnets from around 2013 to the present, with various sub-families and strains throughout.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·