Tweetovi

Blokirali ste korisnika/cu @bkeyes93

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bkeyes93

  1. proslijedio/la je Tweet
    29. sij

    If you are into C++ reverse engineering and never tried OOAnalyzer you are missing out big time!

    Poništi
  2. proslijedio/la je Tweet
    14. sij

    Anticheats such as BattlEye have been trying to detect generic hypervisors, in particular those prevalent in the cheating community (DdiMon and hvpp), by using time-based detections. Here's some advice on that for the developers.

    Poništi
  3. proslijedio/la je Tweet
    24. sij

    BattlEye has begun virtualising all new shellcode, 1:0 to the secret club. Confirms that the developers are lurking my twitter - next article will be released shortly, which will allow you to hook BattlEye while bypassing their internal integrity checks :) stay put

    Poništi
  4. proslijedio/la je Tweet
    19. sij

    Me: “video games are a fun break from security” Also me: “hey look at this RISC VM inside the Quake engine that is client side reachable and prone to sandbox escapes, if you join my server, my code runs on your box!*” * set allow_download to off

    Poništi
  5. proslijedio/la je Tweet
    18. sij

    z3 is a tool we see used in CTFs and and generally reverse engineering. But I just stumbled over this gamedev talk where used z3 to find bugs in the decision/dialogue trees of a game. And even generates valid savegame states with it!!!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    18. sij

    Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    18. sij

    Trynna get something done and brain is just like: 0000 EA NOP 0001 4C 00 00 JMP $0000

    Poništi
  8. proslijedio/la je Tweet
    17. sij

    The good news: That Internet-connected election server in Georgia got fully patched against the vulnerability. The bad news: It was patched by the first hacker to use it

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    18. sij

    haunted by this passage I read about how when you grow up with parents who respond to you intellectually but not emotionally you learn to intellectualize everything you feel and end up being hyperanalytic, hyperneurotic, hypercritical

    Poništi
  10. proslijedio/la je Tweet
    17. sij

    I was impressed when I played Quake3 arena on a raspberry pi 3, I just played openarena on pinebook pro (Manjaro/panfrost) and it’s blown me away, full FPS, high resolution! This is insane, a sub $200 laptop with a decent first person shooter is epic. H/t

    Poništi
  11. proslijedio/la je Tweet
    18. sij

    The long-awaited Black Hat Go is releasing on 2/4/20! If your shipping address has changed since you ordered the book, please email info@nostarch.com. And if you haven't ordered the book yet, there's still time to get 30% off a preorder at !

    Poništi
  12. proslijedio/la je Tweet
    17. sij

    I just published a video explaining the details of CVE-2020-0601 aka Curveball: The Microsoft CryptoAPI vulnerability that was reported by the NSA.

    Poništi
  13. proslijedio/la je Tweet
    16. sij

    To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    18. stu 2019.

    After an additional week of work, ExHook is finally live. ExHook is a standalone project utilizing ByePgLib allowing you to hook all kernel-to-user exits (SYSCALL or any interrupt) bypassing PatchGuard. Enjoy!

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    12. sij

    quick script to decode IOCTLs for Windows drivers. hardcoded values from ntddk.h, devioctl.h, and irclass_ioctl.h. inspired by the OSRonline tool. could have bugs, only tested a few IOCTLs:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    12. sij

    BattlEye, a popular anti-cheat, has been detecting unknown cheats by using heuristics in combination with the x86 trap flag. This was done to specifically target "The Perfect Injector" by from usermode.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  18. proslijedio/la je Tweet
    6. sij
    Odgovor korisniku/ci

    It's also been here for a while

    Poništi
  19. proslijedio/la je Tweet
    5. sij

    Friends, Sometime yesterday I saw someone sharing APT34 toolset leak. They uploaded it to MegaUpload, with it eventually being removed again. I have added APT34 toolset to our archives. It will remain their permanently. You can find the download here:

    Poništi
  20. proslijedio/la je Tweet
    30. pro 2019.

    Microsoft takes down 50 domains operated by Thallium (APT37), a North Korean APT * MSFT wins court order to seize domains * Fourth APT against which this tactic proved successful * First three were Barium (🇨🇳), APT28 (🇷🇺), and APT35 (🇮🇷)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·