Takahiro Haruyama

@cci_forensics

Reverser, Responder, Speaker (e.g., Virus Bulletin, REcon, HITB, DFRWS EU, SANS DFIR Summit, BlackHat Briefings USA/Europe/Asia)

Vrijeme pridruživanja: ožujak 2010.

Tweetovi

Blokirali ste korisnika/cu @cci_forensics

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cci_forensics

  1. Prikvačeni tweet
    23. lis 2019.
    Poništi
  2. 3. velj

    The current BinDiff wrapper uses BinExport 11 due to the BinDiff 6 beta. Please enable BinExport 10 if you use the BinDiff 5

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    プロセスからEmotetを検知するWindows OS用ツールEmoCheckをGitHubに公開しました。Emotetの感染調査などにご活用ください。 ^TT

    Poništi
  4. proslijedio/la je Tweet
    31. sij
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    24. sij

    Hello, guys! Finally, I have released new 3 tools for and for macOS. Please try them and have a nice weekend :) 1st tool: Norimaci is malware analysis sandbox for macOS. This tool was inspired Noriben sandbox. (1/3)

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    21. sij

    Automatic ROP chain generation using ROPgadget (gadgets finding) and Triton (sym. exec. part) by !!

    Poništi
  7. proslijedio/la je Tweet
    21. sij

    UEFI_RETool - tool for UEFI firmware reverse engineering. Based on IDAPython, radare.

    Poništi
  8. 20. sij
    Poništi
  9. 17. sij
    Poništi
  10. proslijedio/la je Tweet
    16. sij
    Poništi
  11. proslijedio/la je Tweet
    16. sij

    Do patch -2020-0601 ASAP to avoid attacks. The delicately crafted signed with root certificate in our test could pass certificate verification and detection rate drops dramatically afterwards.

    Poništi
  12. proslijedio/la je Tweet
    15. sij

    WindowsのECDSAの脆弱性 CVE-2020-0601 の証明ってこんな感じでいいんですかね? 間違いあればどなたかご指摘ください。

    Poništi
  13. proslijedio/la je Tweet
    6. sij
    Poništi
  14. 28. pro 2019.

    I've updated my resume as an annual task. While some skills became out-of-date, new ones were added

    Poništi
  15. proslijedio/la je Tweet
    21. pro 2019.

    FileInsight-plugins 1.5 has been released! Four new plugins ("Binary data to decimal text", "Decimal text to binary data", "Binary data to octal text" and "Octal text to binary data") has been added.

    Poništi
  16. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  17. proslijedio/la je Tweet
    6. pro 2019.

    Python3 support by ! Huge thanks! / ida/idapython_tools/findcrypt at master

    Poništi
  18. proslijedio/la je Tweet
    6. pro 2019.

    De4Dot Fork with ConfuserEx support:

    Poništi
  19. proslijedio/la je Tweet
    4. pro 2019.

    JPCERT/CC released the instruction videos of and MalConfScan with Cuckoo! MalConfScan Summary Demonstration MalConfScan-with-Cuckoo Summary Demonstration

    Poništi
  20. proslijedio/la je Tweet
    3. pro 2019.

    0.55 is finally out, just in time for ! Main changes: olevba += SLK file parser and XLM macro extraction, VBA stomping detection More info: How to install/update: pip install -U oletools

    Poništi
  21. 26. stu 2019.

    375aa963683e84030406a9224fda83bb7f60f4882cc1992563a5b72ae02fea60 winnti 4.0 or related hack tool loader compiled on 2019-06-04

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·