Rezultati pretraživanja
  1. 14. ruj 2019.

    Happy to give away the material of the advanced training "Mobile Reverse Engineering with R2frida" to for his blog post "Dynamic Instrumentation: Frida and for Noobs". Keep up the great work mate! Contact any of the trainers for the link :)

    Prikaži ovu nit
  2. 23. srp 2019.

    Call code from an alive process with via \dxc (Dynamic eXecute Code). For instance, let's call getpid() from libc and then verify the pid with the cmd \dp. Any cool function to arbitrarily call from your target? Go and it!

  3. 1. lis 2019.

    Radare2 and (F|Gh)rida, Better together! Solving the Android Uncrackable CrackMe Level 2 with . (). Solutions were updated.

  4. 22. ruj 2018.

    Learning a lot of this week with protected APKs. It's amazing how you can leverage the union of (static) and (dynamic). The pic illustrates how to find root checks and disassemble it in Thumb mode. At runtime, we observe string deobfuscation going on

  5. 25. srp 2019.

    Switf5 demangling is now supported on and

    swift-frida is now integrated in r2frida <3
  6. 25. ruj 2018.

    Combo: Spawn the APK + syscall hook (trampoline highlighted) + breakpoint and BINGO! Obfuscators are improving a bit 🎷. This week I am suffering "frida-ddiction"

  7. 8. ruj 2018.

    Amazing talk at by about hacking a game by defeating obfuscation using and

  8. 4. ruj 2019.

    Training finished! We survived the training at ! But we are already thinking in improvings for next year! Thanks for this opportunity! //cc ⁦⁩ ⁦

  9. 4. ruj 2019.

    After some video issues...Lets start training at with and ! //cc

  10. 2. lip 2019.

    📽️Here it is! The recording of my 2h session introducing at , from zero up to and basics. I hope it will be useful. Comments and feedback are totally welcomed :) CC:

  11. 6. ruj 2019.

    Who you gonna' syscall? Reversing hardened iOS apps with

  12. 4. lis 2019.

    Very nice slides about Mobile Pentesting with . Solving the Crackmes and Hacking playground with Frida + Excellent work! 👏

  13. 8. ruj 2017.
  14. 16. ruj 2019.

    For MSTG-STORAGE-10, we used to search for the "owasp-mstg" string written in a password field. In this snippet we map the search results 😝 to their location in the memory regions -> \dm. @@ hit1_* 🧙‍♂️✨

  15. 14. ožu 2017.
  16. 21. pro 2019.
  17. 20. pro 2019.

    12/21 13:00~ RADARE2, R2FRIDA YOROZU展示中 SECCON 2019 Akihabara 2019.12.21(sat)-22(sun)

  18. Blogpost: Radare advanced training "Mobile Reverse Engineering with R2frida" "Dynamic Instrumentation: Frida and for Noobs"

  19. 6. ruj 2019.

    The fu***** syscall maistah at the stage in . Lets do some ! //cc

  20. 23. srp 2019.
    Odgovor korisnicima

    \dxc is very helpful indeed. Solves a lot of my problems.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.