Murphy

@as0ler

Security engineer, interested in mobile hacking, reversing and exploiting stuff....

dup2(mylocation, /dev/null);
Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @as0ler

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @as0ler

  1. Prikvačeni tweet
    4. ruj 2019.

    After some video issues...Lets start training at with and ! //cc

    Poništi
  2. proslijedio/la je Tweet
    prije 9 sati

    unc0ver jailbreak for iOS 13.0-13.3 | Coming Soon..!🔥🔥

    Poništi
  3. proslijedio/la je Tweet
    22. sij
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    13. sij

    Just published a new video: Backdooring an IoT camera by creating a malicious firmware upgrade!

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    30. pro 2019.

    "Apple's latest filing should give all security researchers, app developers, and jailbreakers reason to be concerned." Read the full statement from Corellium CEO on Apple's DMCA filing here:

    Poništi
  6. proslijedio/la je Tweet
    30. pro 2019.
    Poništi
  7. proslijedio/la je Tweet
    11. pro 2019.
    Poništi
  8. proslijedio/la je Tweet
    28. stu 2019.

    Earlier this year I got to hack at the original Doom using together with and . Here is a writeup with the details where we go through how we added our own cheat codes!

    Poništi
  9. proslijedio/la je Tweet
    20. lis 2019.
    Odgovor korisniku/ci

    Next year another challenge like this year!

    Poništi
  10. proslijedio/la je Tweet
    4. lis 2019.
    Poništi
  11. proslijedio/la je Tweet
    1. lis 2019.
    Poništi
  12. proslijedio/la je Tweet
    29. ruj 2019.

    Amazing~! No need to use a private JB to get a 0-day research environment now~! We can have a JB environment on the latest iOS version with checkm8. It will help researchers to test and find kernel bugs for untethered jailbreak.

    Poništi
  13. proslijedio/la je Tweet
    27. ruj 2019.

    I contributed a kernel pwnable challenge to the r2con 2019 CTF organized by and . Unfortunately it went unsolved... I've pushed it to , and will later update source code and [even later] exploit. Let me know if you give it a try!

    Poništi
  14. proslijedio/la je Tweet
    25. ruj 2019.

    Very, very hacky, but got a running on an iOS 13.1 device after some inspiration from , using a mettle dylib and . All without a jailbreak ofc. Not a lot of useful meterpreter iOS features, but science... :)

    Poništi
  15. proslijedio/la je Tweet

    Check out malmirror, the script used to mirror and exfiltrate VPC traffic to abuse the new AWS feature, VPC Traffic Mirroring, on our GitHub!

    Poništi
  16. proslijedio/la je Tweet
    19. ruj 2019.

    In case you didn’t make it to r2con in Barcelona, shares all the training, competition and social highlights from the community event focused on all things .

    Poništi
  17. proslijedio/la je Tweet
    18. ruj 2019.

    New improved ObjC.choose via the new CModule API (so cool!) and achieves a remarkable speed up for extremely real-world usage. This is 😍🔥

    Poništi
  18. proslijedio/la je Tweet
    14. ruj 2019.
    Poništi
  19. proslijedio/la je Tweet
    14. ruj 2019.
    Poništi
  20. proslijedio/la je Tweet
    14. ruj 2019.

    Happy to give away the material of the advanced training "Mobile Reverse Engineering with R2frida" to for his blog post "Dynamic Instrumentation: Frida and for Noobs". Keep up the great work mate! Contact any of the trainers for the link :)

    Prikaži ovu nit
    Poništi
  21. 7. ruj 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·