Alexandre Borges

@ale_sp_brazil

Reverse Engineer and Security Researcher. Speaker at DEF CON (USA and China), HITB, CONFidence, NO HAT, DC2711 and others. Author of the Malwoverview tool.

Brazil
Vrijeme pridruživanja: srpanj 2009.

Tweetovi

Blokirali ste korisnika/cu @ale_sp_brazil

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ale_sp_brazil

  1. 1. velj

    Developers have exploited the Samsung Galaxy S9 and Note 9 to get root access on the Snapdragon models:

    Poništi
  2. 31. sij
    Poništi
  3. 31. sij

    American Fuzzy Lop plus plus (afl++): afl++ is afl 2.56b with community patches, AFLfast power schedules, qemu 3.1 upgrade + laf-intel support, MOpt mutators, InsTrim instrumentation, unicorn_mode and a lot more!

    Poništi
  4. 30. sij

    People have asked whether learning about MacOS or Android reversing is worth? Yes, it's. Mobile reversing is my daily job and you should choose one of them and go forward. Official documentation is your first stop: Apple: Android:

    Poništi
  5. 30. sij

    Obfuscapk: A black-box obfuscation tool for Android apps

    Poništi
  6. 26. sij
    Poništi
  7. 23. sij
    Poništi
  8. 21. sij
    Poništi
  9. 18. sij

    No doubts, a quite interesting presentation from about the decompiler internals:

    Poništi
  10. 14. sij
    Poništi
  11. 14. sij

    (remember) Application -> DeviceIoControl( ) (on thread 1) -> Dispatch Routine (by I/O Manager) -> Target Driver -> Device --> Interrupt (done) -> ISR (any thread context) -> DPC (any thread context). It is NOT possible to know the thread context for ISR and DPC in advance ;)

    Poništi
  12. 13. sij
    Poništi
  13. 12. sij
    Poništi
  14. proslijedio/la je Tweet
    11. sij

    I've created a special branch of my Fenrir IOC scanner to detect traces of activity exploiting CVE-2019-19781 - we use strings that appear in XML & log files - please verify Fenrir branch Report by

    Prikaži ovu nit
    Poništi
  15. 9. sij

    Curiously, malware authors have only used the same locking/synchronization technique: mutex. There're many other methods such as interlocked function, worker thread pool + SRW, only SRW (slim reader/writer), critical sections and so on, but they always use the same. Unbelievable.

    Poništi
  16. 9. sij
    Poništi
  17. 8. sij
    Poništi
  18. 7. sij
    Poništi
  19. proslijedio/la je Tweet
    3. sij

    is a first response tool to perform an initial and quick triage in a directory containing malware samples, specific malware sample, suspect URL and domains

    Poništi
  20. 29. pro 2019.

    Malwoverview 2.0.7 is online! This version allows installation using pip: $ pip3.7 install malwoverview (Linux) $ python -m pip install malwoverviewwin (Windows) Further information is available on: (Github)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·