Tweetovi

Blokirali ste korisnika/cu @danigargu

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @danigargu

  1. Prikvačeni tweet
    8. svi 2018.

    I just released HeapViewer. An IDA Pro plugin to examine the glibc heap, focused on exploit development.

    Poništi
  2. proslijedio/la je Tweet
    26. sij

    pake exrop ga perlu buat chainnya secara manual wkwk. solved

    Poništi
  3. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  4. proslijedio/la je Tweet
    24. sij

    Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!

    Poništi
  5. proslijedio/la je Tweet
    24. sij
    Poništi
  6. proslijedio/la je Tweet
    21. sij

    Automatic ROP chain generation using ROPgadget (gadgets finding) and Triton (sym. exec. part) by !!

    Poništi
  7. 20. sij

    My IDA Plugins HeapViewer and deREferencing have been ported to Python3 on GitHub. Both should support python2/3. If you find any error, let me know:

    Poništi
  8. proslijedio/la je Tweet
    10. sij

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Poništi
  9. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi
  10. proslijedio/la je Tweet
    18. sij

    Windows kernel explorer: A free powerful Windows kernel research tool

    Poništi
  11. proslijedio/la je Tweet
    18. sij

    Writeup del reto Papify 2 del CTF organizado por Después de las horas invertidas, qué menos que dejarlo por escrito como referencia para el futuro. Porque se me va a olvidar :) Equipo con y

    Poništi
  12. proslijedio/la je Tweet
    17. sij

    Here’s an IDAPython script that I have been using to populate comments and enum constants for Windows Crypto API. I still need to figure out how to search by constants by name, populate enums with multiple values and add more APIs but it’s still useful.

    Poništi
  13. proslijedio/la je Tweet
    15. sij
    Poništi
  14. proslijedio/la je Tweet
    16. sij
    Poništi
  15. proslijedio/la je Tweet
    16. sij

    CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet

    I was intrigued about how Alexa listened, the potential for false positives and what was recorded. This was done over Xmas and the results leave me with more questions.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    14. sij

    The NSA advisory is much more helpful than Microsoft's.

    Poništi
  18. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  19. proslijedio/la je Tweet
    27. pro 2019.

    Friday night tweetin' for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.

    Poništi
  20. proslijedio/la je Tweet
    27. pro 2019.

    Practical reverse engineering is an awesome book with insightful windows kernel exercises - I decided to complete all of the exercises and post complete write-ups to my solutions 😛🥳 Here's the first one: Reversing AuxKlibQueryModuleInformation

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    20. pro 2019.

    Cutter v1.10 now has a DEBUGGER! 🐞🥳 After a lot of work, we are so happy to announce that we finally implemented your most requested feature. The beta version of the debugger is available NOW on our website >> List of features and what's coming next >>

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·