Binni Shah

@binitamshah

Linux Evangelist. Malwares. Kernel Dev. Security Enthusiast. Coffee, Jain, reformist & Philanthropist. binitamshah at protonmail dot com

0's & 1's of capacitor
Vrijeme pridruživanja: ožujak 2009.

Medijski sadržaj

  1. prije 4 sata

    Turning a hotel key card into a stolen credit card : cc

  2. prije 5 sati

    Lost in my own world 🙈

  3. 1. velj

    Hardware Debugging for Reverse Engineers (Part 1) : SWD, OpenOCD and Xbox One Controllers : cc

  4. 1. velj
  5. 1. velj

    OK Google - Bypass the authentication! (How a chain of vulnerabilities lead to special world working as a passpartout for a Google Assistant application) : cc

  6. 1. velj
  7. 1. velj

    Critical Flaw in Trezor Hardware Wallets (attack relies on voltage glitching to extract an encrypted seed ,crack the encrypted seed which is protected by a 1-9 digit PIN) : : Demo:

  8. 30. sij
  9. 30. sij

    PlaystoreDownloader : A command line tool to download Android applications directly from the Google Play Store : (not affiliated with Google in any way)

  10. 30. sij

    Obfuscapk : A black-box obfuscation tool for Android apps :

  11. 30. sij

    Local root exploit via the QEMU graphics driver : cc SerenityOS : Graphical Unix-like operating system for x86 computers :

  12. 30. sij

    Attacking Azure, Azure AD, and Introducing PowerZure : cc PowerZure : PowerShell script to interact with Azure : Azure AD Connect for Red Teamers :

  13. 30. sij

    Tracking REvil : ( 150k unique infections, extracted ransom demands from 148 samples together demanding more than 38 million dollars)

  14. 30. sij
  15. 28. sij

    iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU : Slides : Demo video of Shared Local Memory (SLM) leakage :

  16. 28. sij
  17. 28. sij

    x86-manpages : x86 and amd64 instruction reference manual pages : cc x86 and amd64 instruction reference : (Last updated 2019-05-30)

  18. 28. sij
  19. 27. sij

    Unfurl : It takes a URL and expands ("unfurls") it into a directed graph, extracting every bit of information from the URL and exposing the obscured : cc

  20. 27. sij

    memhunter : Live hunting of code injection techniques : cc

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·