Rezultati pretraživanja
  1. 8. ožu 2019.

    I just released a short introductory/quickstart tutorial for : Solving a simple crackme.

  2. prije 14 sati

    Blogs, social media, Reddit, and more! Reversing WannaCry Part 2 - Diving into the malware with - YouTube

  3. 4. velj

    Reversing WannaCry Part 2 - Diving deeper into the malware with

  4. 4. velj
  5. 2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

  6. 1. velj

    My solution for MugatuWare from Flare-On 2019 is out 📺 👉 With a special thank you to

  7. 22. sij

    So has just finished streaming 7th installment of solving PicoCTF challenges and I've finished editing part 2 of solving Hitcon's CoreDumb with Ghidra so if you don't have yet enough 👉 📺

  8. 16. sij

    It was supposed to be just a solution but it ended up being a step by step tutorial so here's "Hitchhiker's guide to Ghidra - Solving Hitcon Core Dumb - Part 1" (uff that's long title)

  9. 9. sij

    What's your RE tool of choice: , , ? 🐉 Discover why Three Heads are Better Than One - Then master reversing with Ghidra at with & . Don't forget your Early Bird ticket ➡️

  10. 12. pro 2019.

    Folks, here's why you should follow : 18 years (!) on , speaker, amazing forward and reverse engineer, superb instructor. Check out his talk:

  11. 29. ruj 2019.

    Our talk from has just been uploaded! 🎉 Earlier this month we gave this talk in which we presented Cutter and introduced our native integration with the Decompiler. Enjoy watching! 📺 CC , , ,

  12. 17. kol 2019.

    🤣 cool feature I missed so far: If you aren't able to see which sub-window gets focused, after hitting a button - happily helps you if you hit the button again ... and again ... and again ... and again

    Prikaži ovu nit
  13. 14. kol 2019.

    Excited to share my first video on malware analysis topics. The hype is real, so let's get started there:

  14. 17. svi 2019.

    The RSA talk by has been uploaded to YouTube:

    Prikaži ovu nit
  15. 9. svi 2019.

    The Infiltrate workshop on given by & Jeremy Blackthrone is out!

  16. 4. tra 2019.

    In , simply enabling the pcode field is enough to display the Pcode, checking "Raw Pcode" displays a more verbose version of it. H/T to for pointing this out to me yesterday. Thanks, dude!

    Prikaži ovu nit
  17. 3. tra 2019.

    How to enable Pcode in , the intermediate representation used by the decompiler: 1. Edit -> Tool Options -> Listing Fields -> Pcode Field -> Display Raw Pcode 2. Click the Jenga icon in the top right of the listing, enable the Pcode field in Instructions/Data tab

    Prikaži ovu nit
  18. 27. ožu 2019.

    Just released part 1 of analyzing in ! In this video we will find the killswitch, look at its installation/persistence methods and extract/decrypt the resources contained in the malware!

  19. 19. ožu 2019.

    Discovered this gem in yesterday, what a great use of old PowerPoint-style animations 😂 Even better with the graph view.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.