Erik Pistelli

@erikpistelli

Developer & Reverse Engineer: lead developer of Cerbero Suite, former developer of IDA Pro and author of utilities such as CFF Explorer.

Vrijeme pridruživanja: travanj 2010.

Tweetovi

Blokirali ste korisnika/cu @erikpistelli

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @erikpistelli

  1. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  2. 20. sij

    The integrated Sleigh decompiler seems to work well according to a number of users! If you like it, I'll further increase the features and improve the output!

    Poništi
  3. proslijedio/la je Tweet
    17. sij

    I just published a video explaining the details of CVE-2020-0601 aka Curveball: The Microsoft CryptoAPI vulnerability that was reported by the NSA.

    Poništi
  4. proslijedio/la je Tweet
    15. sij

    Version 3.5 is out with the Ghidra decompiler integrated in Carbon (no Ghidra or Java installation necessary). The decompiler features navigation, comments and renaming of functions, labels and variables. Happy hacking!

    Poništi
  5. 11. sij

    Close to releasing the first version of Carbon with the Ghidra decompiler. Just built on Linux and seems to work nicely! Few days and it should be good to go... ;)

    Poništi
  6. 5. sij

    These days I was playing with the Ghidra decompiler to see how well it would work integrated with Carbon (i.e. no Ghidra installation, no Java UI). This is a small PoC. Do you like the idea?

    Poništi
  7. proslijedio/la je Tweet
    31. pro 2019.

    i love how people are shocked that doesn’t like security researchers (see drama), meanwhile i’ve been banned from doing research for them for 8 years.

    Poništi
  8. proslijedio/la je Tweet
    30. pro 2019.

    TIL records every IP address & device you've used to download and update apps from App Store, and save it indefinitely. I just got my 10 years of IP address history by requesting "iTunes and App-Book Re-download and Update History.csv" from

    Poništi
  9. proslijedio/la je Tweet
    27. pro 2019.

    Friday night tweetin' for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.

    Poništi
  10. proslijedio/la je Tweet
    25. pro 2019.

    Friends, I am very pleased to announce that I have managed to re-assemble the original 29a archives in totality. All zines are now present in what was once their original form. 1luv -smelly__vx

    Poništi
  11. proslijedio/la je Tweet

    I don't use macOS, I wasn't aware Apple had removed the ability to create 32bit segment descriptors. That breaks wine, so they've had to build a clang plugin to generate thunks that translate pointers between 32/64 code, neat.

    Poništi
  12. proslijedio/la je Tweet
    18. pro 2019.

    Best. Tool. Ever! Generates believable nonsense in your terminals to make it look like you're working

    Poništi
  13. proslijedio/la je Tweet
    12. pro 2019.

    A short history of torture

    Poništi
  14. proslijedio/la je Tweet
    8. pro 2019.

    Version 3.4.1 is out with official support for Ghidra 9.1 stable. Happy hacking!

    Poništi
  15. proslijedio/la je Tweet
    18. stu 2019.

    So Phineas Fisher wrote a detailed guide howto hack a bank and transfer money via SWIFT. It seems he failed transferring large amounts because of missing knowledge in the interbanking environment. A circumstance that could change quickly.

    Poništi
  16. proslijedio/la je Tweet

    New Android versions introduce a blacklist of APIs that are not accessible even via reflection. Cool trick I haven't seen before: using double reflection, make the (whitelisted) system do the prohibited reflection for you, a sort of confuse deputy attack:

    Poništi
  17. proslijedio/la je Tweet
    15. lis 2019.

    And, done! 2.0 with support for Python 3.X and IDA 7.4 has been published:

    Prikaži ovu nit
    Poništi
  18. 6. lis 2019.

    Video: Full analysis of a multi-stage malware - - doc -> vba -> jscript -> exe -> shellcode -> mapped exe -> iat rebuild -- javascript deobfuscation code at:

    Poništi
  19. proslijedio/la je Tweet
    4. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    3. lis 2019.

    Video for my RECON 2019 talk, "Automation Techniques in C++ Reverse Engineering", is now available:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·