Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @enovella_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @enovella_
-
Prikvačeni tweet
Unofficial
#r2frida wiki with practical examples to get started with@radareorg and@fridadotre. Link: https://github.com/enovella/r2frida-wiki … -#Android#ReverseEngineering#Frida#Radare2#iOSpic.twitter.com/rEKxro7YoI
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
VSCode x
@fridadotre * VSCode based GUI * Interactive terminal * Remote file browser (Yes!) * Open source Not on market yet. But you can built it from the source: https://github.com/chichou/vscode-frida …pic.twitter.com/sG5UhDy2WdPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
"Code emulation for reverse engineers: a deep dive into radare2's ESIL" by
@arnaugamez is our next addition to the program for#RuhrSec 2020! We are excited to learn more about#radare :)pic.twitter.com/WVWMv1FbKG
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
My colleague Piergiovanni and I will present Brida 0.4 at Hack In Paris 2020 with a new graphical custom plugin generator and many useful built-in Frida hooks! See you there!
@Burp_Suite@fridadotre@hackinparishttps://hackinparis.com/talks/#talk-2020-easy-mobile-penetration-testing-with-brida …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Eduardo Novella proslijedio/la je Tweet
Aircrack-ng 1.6 released https://aircrack-ng.blogspot.com/2020/01/aircrack-ng-16.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
Analyzing Kony Mobile Applications
#MobileSecurity@fridadotre by Terry Chia https://www.ayrx.me/analyzing-kony-mobile-applications …pic.twitter.com/sm6rH9aJnj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm (https://github.com/CalebFenton/simplify …) for execution. Here's a quick video of me stepping through two similar methods.
#AndroidSecurity#ReverseEngineeringpic.twitter.com/72Ic5PB8MKHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
CyberTruck Challenge 2019 - Android CTF
#MobileSecurity#AndroidSecurityhttps://medium.com/bugbountywriteup/cybertruck-challenge-2019-android-ctf-e39c7f796530 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
r2frida 4.2 is out! You can now use breakpoints and eternalize
@fridadotre scripts in@radareorg ! /cc@NowSecureMobilepic.twitter.com/BtdKWZ1onI
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
Open sourced a bit of automation around unpacking
#Android apps using@CorelliumHQ devices;https://github.com/corellium/corellium-android-unpacking …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
The recording of our (with
@tieknimmers) fault injection on Secure Boot talk showing a fault simulator and glitching an Android device live on stage at@BlackHatEvents EU '18 got published! Now is your chance to watch it back it if you weren't there!https://www.youtube.com/watch?v=7DYkV4uZqS8 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
Do you know how to change the process name of android apps at runtime? Here is a blog post explaining the mechanism https://darvincitech.wordpress.com/2019/10/31/runtime-process-name-change-for-android-apps/ …
#MobileSecurity#AndroidSecurityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
Take a look at this blog https://darvincitech.wordpress.com/2020/01/07/security-hardening-of-android-native-code … on how to harden your native Android library using O-LLVM obfuscator, replacing libc with syscalls.
#Android#AndroidSecurity#MobileSecurity#obfuscate#fridaHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
Here is my blog post on detecting magisk hide using an android feature https://darvincitech.wordpress.com/2019/11/04/detecting-magisk-hide/ …
#AndroidSecurity#MobileSecurityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
But…
The attacker tweaks a few strings in their frida-server binary using a hex editor, and the fun starts.
The user gets their battery drained quicker when such code has been pasted into many popular apps.
High price to pay for the illusion of slowing down attackers?
https://twitter.com/insitusec/status/1195464033249431553 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
Slides of the
#Dragonblood attack against WPA3 and EAP-pwd, given at#realworldcrypto together with@eyalr0 http://papers.mathyvanhoef.com/rwc2020.pdf pic.twitter.com/MQ97kXVWgw
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
Glad to announce that I'll speaking at Black Hat Asia about native code (de)obfuscation on Android! https://www.blackhat.com/asia-20/briefings/schedule/index.html#dynamic-binary-instrumentation-techniques-to-address-native-code-obfuscation-18309 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
Hi there. This is THE Eagle speaking. Boring status pages, how you doin'? This is just the beginning.https://eaglestatus.io
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Eduardo Novella proslijedio/la je Tweet
Happy new decade!
#android#security is still a thing, thus we will host the third edition of#AndroidSecuritySymposium in Linz, Austria on July 6-7, 2020 (at@jkulinz, co-located with@acm_wisec) More details and call for speakers: https://android.ins.jku.at/symposium/ pic.twitter.com/TozGDWk1jv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.