Tweetovi

Blokirali ste korisnika/cu @grepharder

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @grepharder

  1. 27. sij
    Poništi
  2. proslijedio/la je Tweet
    24. sij

    We're closing out the week strong by announcing the Open Source Security Coalition's latest partners: and !

    Poništi
  3. proslijedio/la je Tweet
    17. sij
    Poništi
  4. proslijedio/la je Tweet
    10. pro 2019.

    Frida 12.7.26 is out with an exciting new NativeFunction option which re-activates Stalker for the duration of each function call 🎉 Useful for e.g. coverage-guided fuzzing, changing behavior without hooking, reversing, etc. Full change log at the end of

    Poništi
  5. 29. stu 2019.

    Very nice slides by covering all MASVS categories on iOS 👍

    Poništi
  6. proslijedio/la je Tweet
    18. stu 2019.

    Nice solution with Angr for our "UnCrackable App for iOS Level 1". If you want to Reverse Engineer also other iOS/Android apps, have a look at our Crackmes:

    Poništi
  7. proslijedio/la je Tweet
    14. stu 2019.

    Superb library created by to secure iOS apps . I made a quick PoC and it works as a charm . With this library you can easily detect: - Jailbreak - being debugged - Reverse Engineering Tools (e.g. Frida) - Run in an emulator

    Poništi
  8. proslijedio/la je Tweet

    Want to help making mobile hybrid apps secure? Then we are looking for you! Check

    Poništi
  9. proslijedio/la je Tweet
    12. stu 2019.

    Frida 12.7.22 is out with improved support for the iOS jailbreak! 🎉 The package scripts were failing to start/stop frida-server previously due to launchctl being assumed to reside in /bin. Full changelog appended to the 12.7 announcement:

    Poništi
  10. proslijedio/la je Tweet
    10. stu 2019.

    checkra1n beta 0.9 is now available at ! - this is an early release and as such you should not be running it on a primary release. please read the FAQ on the website for additional information. reddit:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    10. stu 2019.
    Poništi
  12. 26. lis 2019.
    Poništi
  13. proslijedio/la je Tweet
    24. lis 2019.

    Our team represented by published technical analysis of the checkm8 exploit

    Poništi
  14. proslijedio/la je Tweet

    The German and Spanish translation of the MASVS are in! The Japanese & French is in review. Now waiting for the Chinese and Russian translation to be made. Want to help? Check

    Poništi
  15. 9. lis 2019.
    Poništi
  16. 7. lis 2019.
    Poništi
  17. 4. lis 2019.

    Very nice slides about Mobile Pentesting with . Solving the Crackmes and Hacking playground with Frida + Excellent work! 👏

    Poništi
  18. proslijedio/la je Tweet

    We are joining the October 2-31. Check out our issues: The first 50,000 participants who successfully complete 4 PRs will earn a T-shirt :tada:. Register at

    Poništi
  19. proslijedio/la je Tweet

    Want more training apps? We hear you! We just released the MSTG-Android-Java & MSTG-Android-Kotlin for Android and the MSTG-JWT app for iOS. Come and check it out at ! With special thanks to , , , and !

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·