-
Nice of Microsoft to add telemetry for
#CVE-2020-0601, they are expecting exploitation New Function in crypt32.dll - ChainLogMSRC54294Error CveEventWrite(L"[CVE-2020-0601] cert validation", v8);#diaphora pic.twitter.com/1eW8YZUIWB
-
Diffing the decompiler's output is usually much-much better than diffing assembly
#diaphora pic.twitter.com/Rd8OIoBnZD
-
Just a screenshot of
#Diaphora showing the results of diffing the iOS kernel (ARM) against the MacOSX kernel (x86_64). pic.twitter.com/DyBnzy56QJ
-
Workshop on Philosophical Methodology today.
@ediazleon speaks on ‘Social Construction, Grounding, and Conceptual Ethics’. Very revealing plus no knockdown objections in sight! @LogosRG#Diaphora pic.twitter.com/O74RyRY5aC
-
I finally got to play around with
#Diaphora. Easily one of the best diff tool available. Kudos to@matalaz. https://github.com/joxeankoret/diaphora … -
Someone is searching for a
#Diaphora on http://www.gotomyjob.nl . -
2019-02-01:
#APT28#XTunnel Proxy/Backdoor Mimicking as 1-"javaUi.exe" & 2-"javapolicy.exe" Examined w/#Diaphora - Significant Function Overlap ~2000 Original Name: "Xtunnel_Http_Method.exe" Proxy Com Serv: 109.236.93[.138 [AS49981] 176.31.112[.10 [AS16276] h/t@CNMF_VirusAlertpic.twitter.com/hPBQj2bR7x
-
#Diaphora is very cool too, it has made me look like I really know what I'm doing at least 3 times -
Fwiw,
#diaphora found tons of super helpful matches. I know you built it with VR in mind, but its awesome for porting RE'd func names from one firmware blob to another -
-
Did you know that you can write project hooks Python scripts in
#Diaphora to filter, modify, adapt, etc... whatever gets exported? This is an example script for doing so: https://github.com/joxeankoret/diaphora/blob/master/hooks/my_hooks.py … -
Getting ads about the things I like, such as "organic products" and "recycled materials", incite skepticism instead of an agreement now, as I know what my filter bubbles are. Now, I aim to do my research. After all, filter bubbles are exactly that: filters and bubbles.
#diaphora -
-
If you found situations when using
#diaphora where big functions with the same name and with only 1 line of difference (or so) were assigned a ratio of 1.0, grab the latest version where I fixed it: https://github.com/joxeankoret/diaphora/commit/44dfc7d31401f94764f1f62f2de626527c7fb29c …Prikaži ovu nit -
And to answer my previous question,
#diaphora seems to find the first match sequentially in the address space. Which means to get the best value, I need to strip out the flash copy of the code, and just leave the ram code which is what I'm interested in getting labels on -
Added 2 new heuristics in
#Diaphora: Strongly connected components and Loop count. https://github.com/joxeankoret/diaphora/commit/8b7c7ef7e7898fbd0eae49d6e9b6252990e470c5 … -
Now that IDA supports a new decompiler,
#Diaphora also supports a new arch, so diffing ARM-x86-AMD64 & PPC interchangeably is supported. -
I agree, I think its good that there is more than one option for diffing binaries. I think
#Diaphora is great! and maintaining that type of tool all by yourself is extremely hard, so well done! -
Love
#Diaphora, for sure. Ghidra built-in diffing is useful for me all the time, but I haven't tried it in the "just got the new release of a binary, gotta diff it with my DB of the old one" case at all. -
Thank you very much to the anonymous supporter of
#Diaphora that just donated 100€! You will like the next features I'm going to add in the future ;) And, as various times already before, something that nobody did (publicly).
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.