Tweetovi

Blokirali ste korisnika/cu @byte_swap

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @byte_swap

  1. 20. stu 2019.

    "Why exploit chrome? Because its hard!" quote from and slides from POC20

    Poništi
  2. proslijedio/la je Tweet
    15. stu 2019.

    Paged Out! #2 Thanks to all the authors and the institute! Enjoy!

    Poništi
  3. proslijedio/la je Tweet
    6. stu 2019.

    How complicated is cellular baseband firmware? At least this complicated: over 150K debugging messages across 932 directories and 2,775 files! Rebuilding the source code skeleton from Samsung S10's Shannon S5000 baseband debugging messages.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    2. stu 2019.

    Here's a example script...this time in Python! Sorry it's late, I blame Halloween. =) This one exercises the parallel decompiler from a script. Very useful if you have a bunch of cores lying around!

    Poništi
  5. proslijedio/la je Tweet
    28. lis 2019.

    I built an iOS kernel debugger called KTRW based on a KTRR bypass for the iPhone X. It is capable of patching kernel __TEXT_EXEC, loading kernel extensions, and performing single-step kernel debugging with LLDB and IDA Pro over USB:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    17. lis 2019.

    The fuzzy C/C++ code analysis platform Joern has been resurrected! - many thanks to and !

    Poništi
  7. proslijedio/la je Tweet
    15. lis 2019.

    Added a script that colorizes function changes between two programs to It is a clutch to get very ghetto graph diff viewing in :

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    14. lis 2019.

    I am super happy that is a thing now -- thanks for making this a reality; this is super useful for research into Binary Diffing, symbol search, disassembly quality etc.

    Poništi
  9. proslijedio/la je Tweet
    20. ruj 2019.
    Poništi
  10. proslijedio/la je Tweet
    19. ruj 2019.

    Yet another announcement: We just released the code for Pretender: . This work tackles the problem of peripheral model generation and will be presented by Eric Gustafson next week at RAID. Kudos to everyone involved! Full paper here:

    Poništi
  11. proslijedio/la je Tweet
    18. ruj 2019.

    From EURECOM/UCSB/Sandia at RAID 2019, we have PRETENDER, which observes the execution of a real device and automatically builds models of its peripherals so that the firmware can be emulated (rehosted) in a virtual environment:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    16. ruj 2019.

    Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers!

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    11. ruj 2019.

    Patch-gapping is also highly relevant to the Linux kernel, where known vulns sit in the syzkaller dashboard or wait months for batches of fixes to be deployed in distro kernels

    Poništi
  14. proslijedio/la je Tweet
    5. ruj 2019.

    afl++ 2.54c has been released! New features, better platform support, better code!

    Poništi
  15. proslijedio/la je Tweet
    18. lip 2019.

    Just uploaded on my slides for my talk on exploiting chrome by attacking TurboFan. Thanks for the opportunity to present :-)

    Poništi
  16. proslijedio/la je Tweet
    17. lip 2019.

    Just discovered the plugin HyperPwn () by bet4it that provides a flexible TUI to . Good stuff!

    Poništi
  17. proslijedio/la je Tweet
    Poništi
  18. proslijedio/la je Tweet
    24. svi 2019.

    Few people were interested in slides from the presentation "Easier Windbg scripting with Javascript" so I posted them here

    Poništi
  19. 22. svi 2019.

    as much as i like ghidra. the internal handling of Adresses is really a pain to develop plugins with at the moment...

    Poništi
  20. proslijedio/la je Tweet
    16. svi 2019.

    New blog post written together with my friend about using the JIT to abuse a non-JIT bug in Chakra (CVE-2019-0812)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·