Daniel Baier

@danielbaier

"young" enthusiast for vulnerability research, malware analysis, martial arts and philosophy

Bonn
Vrijeme pridruživanja: kolovoz 2009.

Tweetovi

Blokirali ste korisnika/cu @danielbaier

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @danielbaier

  1. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  2. proslijedio/la je Tweet
    22. sij

    🎉 New feature: the Malpedia Library! Thanks to significant community efforts, all URLs are now shown as meta data enriched entries with titles, date, authors, and more!

    Poništi
  3. proslijedio/la je Tweet
    16. sij
    Poništi
  4. proslijedio/la je Tweet
    10. sij
    Poništi
  5. 28. pro 2019.

    Yesterday I was clever, so I wanted to change the world. Today I am wise, so I am changing myself - Rumi

    Poništi
  6. 28. pro 2019.
    Poništi
  7. proslijedio/la je Tweet
    19. pro 2019.

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Poništi
  8. proslijedio/la je Tweet
    18. pro 2019.

    Frida 12.8 is out 🎉 Not only can NativeFunction calls be followed with ability to mutate their instruction streams on a per thread basis, but also ObjC and Java calls. We now also support direct memory access through brand new ArrayBuffer APIs.

    Poništi
  9. proslijedio/la je Tweet
    17. pro 2019.

    🌟Here's the video for one of my fave talks that I gave this year!🌟 I cover 60 slides of code in 30 min as I explain all the obfuscation used by the botnet, Nicro, at . Who knew Java could be so fun?! Slides:

    Poništi
  10. proslijedio/la je Tweet
    14. pro 2019.

    1. See failure as a beginning. 2. Never stop learning. 3. Assume nothing, question everything. 4. Teach others what you know. 5. Analyze objectively. 6. Practice humility. 7. Respect constructive criticism. 8. Take initiative. 9. Give credit where it's due. 10. Love what you do.

    Poništi
  11. proslijedio/la je Tweet
    15. pro 2019.

    Andriller CE (Community Edition) - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices

    Poništi
  12. proslijedio/la je Tweet

    The slides of my Static Android Malware Analysis workshop at can be found here:

    Poništi
  13. proslijedio/la je Tweet
    12. pro 2019.

    The video of my talk on analyzing and reverse engineering Pre-Installed Android applications is up! I discuss 4 case studies of security issues with pre-installed apps too.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    11. pro 2019.

    New guidance on Linux-stable Merges for Android: -- looks positive, reducing the patch gap for upstream kernel security bugs is really important. The window of exposure for publicly known issues is too long at the moment.

    Poništi
  15. proslijedio/la je Tweet
    11. pro 2019.

    Von Mitarbeiter-Awareness über bis zur Schadsoftwareanalyse – das neue Kursprogramm 2020 des »Lernlabors « () ist online. Wir trainieren praxisnah, bei uns oder bei Ihnen. 📌

    , , i još njih 3
    Poništi
  16. 7. pro 2019.

    Here are the slides for the talk by me on DeStroid in automatically deobfuscate encrypted strings in Android malware. Including some bonus slides:)

    Poništi
  17. proslijedio/la je Tweet
    6. pro 2019.

    is finished... Thanks to all of you ! We will be back next year for in Nantes, France, 1st to 4th December 2020 !

    Poništi
  18. proslijedio/la je Tweet
    6. pro 2019.

    Here are the slides for the talk by and me on YARA-Signator, a tool for automated generation of code-based YARA signatures for ! Including some bonus slides on statistics for the 157,806,663 instructions processed. :) ->

    Poništi
  19. proslijedio/la je Tweet
    5. pro 2019.

    Humbled by the amazing free resources out there if you want to learn the art and science of reverse engineering. with the latest entry in the ring! 💪 Others: 🙇‍♂️

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    5. pro 2019.

    Frida 12.7.25 is out 🎉 - Node.js fix by - Enhanced symbol enumeration by - Java.use() cache control option by and H4oK3 - Sub-millisecond timestamps in the V8 runtime Full change log at the end of

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·