Eduardo Novella

@enovella_

Android ɹǝǝuᴉƃuǝ ǝsɹǝʌǝɹ, Crypto, Linux, SW & HW sec and any cool stuff with 1's or 0's. Occasionally CTFs. Mobile Researcher

Valencia (ES) - London (UK)
Vrijeme pridruživanja: srpanj 2012.

Tweetovi

Blokirali ste korisnika/cu @enovella_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @enovella_

  1. Prikvačeni tweet
    9. sij 2019.
    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    VSCode x * VSCode based GUI * Interactive terminal * Remote file browser (Yes!) * Open source Not on market yet. But you can built it from the source:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    28. sij

    "Code emulation for reverse engineers: a deep dive into radare2's ESIL" by is our next addition to the program for 2020! We are excited to learn more about :)

    RuhrSec 2020 Speaker Arnau Gàmez i Montolio
    Poništi
  5. proslijedio/la je Tweet
    28. sij

    My colleague Piergiovanni and I will present Brida 0.4 at Hack In Paris 2020 with a new graphical custom plugin generator and many useful built-in Frida hooks! See you there!

    Poništi
  6. proslijedio/la je Tweet
    24. sij
    Poništi
  7. proslijedio/la je Tweet
    25. sij
    Poništi
  8. proslijedio/la je Tweet
    11. sij
    Poništi
  9. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  10. proslijedio/la je Tweet
    2. sij
    Poništi
  11. proslijedio/la je Tweet
    23. sij

    r2frida 4.2 is out! You can now use breakpoints and eternalize scripts in ! /cc

    Poništi
  12. proslijedio/la je Tweet
    20. sij

    Open sourced a bit of automation around unpacking apps using devices;

    Poništi
  13. proslijedio/la je Tweet
    16. sij

    The recording of our (with ) fault injection on Secure Boot talk showing a fault simulator and glitching an Android device live on stage at EU '18 got published! Now is your chance to watch it back it if you weren't there!

    Poništi
  14. proslijedio/la je Tweet
    26. pro 2019.

    Do you know how to change the process name of android apps at runtime? Here is a blog post explaining the mechanism

    Poništi
  15. proslijedio/la je Tweet
    6. sij

    Take a look at this blog on how to harden your native Android library using O-LLVM obfuscator, replacing libc with syscalls.

    Poništi
  16. proslijedio/la je Tweet
    6. stu 2019.

    Here is my blog post on detecting magisk hide using an android feature

    Poništi
  17. proslijedio/la je Tweet
    11. sij
    Odgovor korisniku/ci

    😎 But… The attacker tweaks a few strings in their frida-server binary using a hex editor, and the fun starts. The user gets their battery drained quicker when such code has been pasted into many popular apps. High price to pay for the illusion of slowing down attackers? 👇

    Poništi
  18. proslijedio/la je Tweet
    10. sij

    Slides of the attack against WPA3 and EAP-pwd, given at together with

    Poništi
  19. proslijedio/la je Tweet
    10. sij

    Glad to announce that I'll speaking at Black Hat Asia about native code (de)obfuscation on Android!

    Poništi
  20. proslijedio/la je Tweet
    9. sij

    Hi there. This is THE Eagle speaking. Boring status pages, how you doin'? This is just the beginning.

    Poništi
  21. proslijedio/la je Tweet
    8. sij

    Happy new decade! is still a thing, thus we will host the third edition of in Linz, Austria on July 6-7, 2020 (at , co-located with ) More details and call for speakers:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·