Dmitriy Evdokimov

@evdokimovds

maintainer. Interests: exploit mitigations, fuzzing, binary analysis. co-organizer

Vrijeme pridruživanja: ožujak 2010.

Tweetovi

Blokirali ste korisnika/cu @evdokimovds

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @evdokimovds

  1. proslijedio/la je Tweet
    30. sij

    Hey-hey, check out our new research. Piercing the Shield. Breaking the FunctionShield cloud security library. (TL;DR Do not rely on FunctionShield if you're using it. Get some bounty if you know a project that relies on it)

    Poništi
  2. proslijedio/la je Tweet
    3. sij

    It was a pleasure to open conference last year. We really need to rethink the meaning of HW/FW security in the realities of modern threat landscape! We trust blindly anything which is signed and come from "trusted source" (Integrity != TRUST).

    Poništi
  3. 1. sij

    Happy New Years my friends!

    Poništi
  4. proslijedio/la je Tweet
    26. pro 2019.

    for Haywire Only a memory dump is checked, there may be problems with other functionality SecureROM of Haywire also in repo, enjoy! Thanks to for usefull thread about Haywire

    Poništi
  5. proslijedio/la je Tweet
    25. pro 2019.

    We made a website which shows a genealogy of fuzzers: Basically, this is a fork from the one we have in the survey, but which we can keep up-to-date and where anyone can contribute at:

    Poništi
  6. proslijedio/la je Tweet
    19. pro 2019.

    Apple renamed iOS Security Guide to Apple Platform Security Guide, and a new version has just been published. There is a lot of new content, and the PDF is now 157 pages long (up from 94). This is a must-read. PDF: Web:

    Poništi
  7. proslijedio/la je Tweet

    afl++ 2.59c was released: - new: radamsa, qbdi fuzzing, python3, llvm10, more *BSD and Android support and many more things :)

    Poništi
  8. proslijedio/la je Tweet
    17. pro 2019.

    Now most of the speakers' videos and slides are available on the 2019 website

    Poništi
  9. proslijedio/la je Tweet
    11. pro 2019.

    windbgtool - a WinDbg Toolbox package. This tool runs more complicated operations. Based on pykd, capstone, pyvex, archinfo, cffi.

    Poništi
  10. proslijedio/la je Tweet
    11. pro 2019.

    pyiptanalyzer - a python wrapper around IPTAnalyzer (Intel PT log analyzer).

    Poništi
  11. proslijedio/la je Tweet
    11. pro 2019.

    crauEmu was rewritten using new uEmu extension system!

    Poništi
  12. proslijedio/la je Tweet
    10. pro 2019.

    Full list of talks for is now up! Only 50 seats left!

    Poništi
  13. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  14. proslijedio/la je Tweet
    14. stu 2019.
    Poništi
  15. proslijedio/la je Tweet
    26. stu 2019.

    FIDL- A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research.

    Poništi
  16. proslijedio/la je Tweet
    19. stu 2019.

    2019 edition. Grand Opening!

    Poništi
  17. proslijedio/la je Tweet
    15. stu 2019.

    ZeroNights 2019! Thank you for being with us during those two amazing days. We try to make the conference better for you and take into account all your comments. Please, help our - provide your opinion answering these questions

    Poništi
  18. proslijedio/la je Tweet
    13. stu 2019.

    2019 is finished! Thank you very much our speakers, participation’s and partners! You’re cool! See you next year;)

    Poništi
  19. 13. stu 2019.

    Cool work and funny slides by Ke Liu () !

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·