Tweetovi

Blokirali ste korisnika/cu @hanhvietphan

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hanhvietphan

  1. proslijedio/la je Tweet
    12. stu 2019.

    Thư ngỏ Tôi và sứ quán Làm ơn RT để biết rằng đây là vấn đề mà nhiều người quan tâm

    Poništi
  2. proslijedio/la je Tweet
    26. lis 2019.

    📺New video in my "Analyzing " 🔎 series for beginners - we get started on a mini-series dedicated to analyzing the STOP Ransomware, including unpacking it 📦.

    Poništi
  3. proslijedio/la je Tweet
    27. ruj 2019.
    Poništi
  4. proslijedio/la je Tweet
    18. ruj 2019.

    I found a vulnerability in VirtualBox 7 months ago, then I submitted into ZDI and somehow they still investigate it until it was patched within this month.

    Poništi
  5. proslijedio/la je Tweet
    23. kol 2019.

    Slides for my Hitcon 2019 talk has been uploaded! It covers everything I know about cookie exploitation.

    Poništi
  6. 15. kol 2019.
    Poništi
  7. proslijedio/la je Tweet
    30. srp 2019.
    Poništi
  8. proslijedio/la je Tweet
    24. srp 2019.

    I’m super excited for this week’s stream! I get to finally go through some screenshots and create a list of “interesting” Yahoo sub domains. See you then! 🙏🏼

    Poništi
  9. proslijedio/la je Tweet
    14. srp 2019.

    I think these are the two most useful posts I have on my blog (i.e. I'm referencing them in chat a lot): FAQ: How to learn reverse-engineering? FAQ: How to find vulnerabilities?

    Poništi
  10. Poništi
  11. proslijedio/la je Tweet

    The latest in our blog series is here. explains how to automate bug hunting by modeling vulnerable code, including examples using Binary Ninja, IDA, and Ghidra.

    Poništi
  12. proslijedio/la je Tweet
    12. lip 2019.

    Heap Overflow Exploitation on Windows 10 Explained (with info leak & code execution examples):

    Poništi
  13. proslijedio/la je Tweet
    3. lip 2019.

    📺 New Tutorial Video 📺 Reverse engineering C++ malware with IDA Pro: classes, constructors, structs, and more! A first in our series moving beyond malware triage and onto full .

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    22. tra 2019.
    Poništi
  15. proslijedio/la je Tweet
    8. tra 2019.

    Crypto-Banking Ransomware found on Google Play Once it lured my PayPal credentials it encrypted my files on external medium and locked my device with black screen.

    Poništi
  16. proslijedio/la je Tweet
    2. tra 2019.
    Poništi
  17. proslijedio/la je Tweet
    28. ožu 2019.

    Although I don't use twitter most of the time, I decided to share some small 0days in Microsoft Browsers. PoC for Internet Explorer: PoC for Microsoft Edge: blog post soon.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    24. ožu 2019.
    Poništi
  19. proslijedio/la je Tweet
    22. ožu 2019.

    Python for Reverse Engineering 1: ELF Binaries

    Poništi
  20. proslijedio/la je Tweet
    17. ožu 2019.

    This is a very good article about how to unpack a mobile malware

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·