Caleb Fenton

@caleb_fenton

Security, malware, reverse engineering, machine learning, cryptocurrencies, tech news, real talk.

Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @caleb_fenton

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @caleb_fenton

  1. Prikvačeni tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  2. prije 2 sata

    I suspect phishing scams will be Turing tests soon. It's getting easier to automate with off the shelf machine learning tools.

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    How to create fake traffic jams in Google Maps with bucket full of smartphones Different perspective: 1) Buy mobile bots 2) Spoof GPS location 3) Control traffic

    Poništi
  4. 4. velj

    Machine learning app idea: train a model to detect and remove glug and sip mouth noises when people drink coffee. Then, apply to all podcasts. Sit back and wait for time magazine to call you for person of the year interview.

    Poništi
  5. 3. velj

    Co-worker just sent me this. 🔥

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    You often read about IPOs minting a horde of the newly rich. The reality for most of the rank and file is far from that. As we roll into tax season, an tale from a 2019 IPO 👇

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    28. sij

    Google says it paid bug hunters $6.5 million in 2019 - paid 461 researchers in total - highest award was $201,000

    Poništi
  8. 2. velj

    Russia blocks encrypted email service ProtonMail In other words "Russia validates the integrity of ProtonMail"

    Poništi
  9. proslijedio/la je Tweet
    28. sij

    What if we see level generation as a game, where each action changes the level in some way? Well, we could use RL to learn to "play" level generation! We introduce Procedural Content Generation via Reinforcement Learning (PCGRL), a new paradigm for PCG.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    2. ruj 2019.

    Want to learn but don't know where to begin? Check out my online course designed for beginners starting off in @ ! We cover everything from Assembly and Banking Trojans to Word Macros and Unpacking! 🔒

    Poništi
  11. proslijedio/la je Tweet
    19. sij

    Had to verify. And yes. Kernighan and Ritchie really did this. TIL :)

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    22. sij

    The IoT23 is released! The first dataset with IoT network traffic: containing malicious and benign scenarios. It was captured in the Aposemat laboratory. Aposemat is a joint project between and Take a look at it!

    Poništi
  13. proslijedio/la je Tweet

    We’re all him...😂🤣😭💀💀

    Poništi
  14. proslijedio/la je Tweet
    24. sij

    Post-exploitation tip: Do you know how to trivially & remotely hijack an session without prompt nor warning on user's side using signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details:

    Poništi
  15. proslijedio/la je Tweet
    20. sij

    A pretty comprehensive review of detection methods. Definitely a lot more to be done but every great research starts with a good understanding of the state-of-the-art. Read, enjoy and share!

    Poništi
  16. 29. sij

    If I'm not getting any work done, this is why. At first I just thought she was just needy, but I think she senses when I'm frustrated (i.e. yelling at computer) and is trying to make me feel better. Or she's just hungry. ¯\_(ツ)_/¯ Who else has to deal with distractions?

    Poništi
  17. 29. sij

    I'm trying to understand my audience better. What's your most annoying tweet type? Am I missing a category?

    Poništi
  18. proslijedio/la je Tweet
    19. sij

    When your exploit finally works. This GIF never gets old 🤣😂

    Poništi
  19. proslijedio/la je Tweet
    28. sij

    1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    18. sij

    Today I updated the Zeek Anomaly Detection created by to use ZAT (Zeek Analysis Tools) instead of Brothon. This simple tool does a basic anomaly detection using PCA on the Zeek's conn.log. Now it's faster and more memory efficient. Code:

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    28. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·