Rezultati pretraživanja
  1. 14. ruj 2019.

    Happy to give away the material of the advanced training "Mobile Reverse Engineering with R2frida" to for his blog post "Dynamic Instrumentation: Frida and for Noobs". Keep up the great work mate! Contact any of the trainers for the link :)

    Prikaži ovu nit
  2. 23. srp 2019.

    Call code from an alive process with via \dxc (Dynamic eXecute Code). For instance, let's call getpid() from libc and then verify the pid with the cmd \dp. Any cool function to arbitrarily call from your target? Go and it!

  3. 1. lis 2019.

    Radare2 and (F|Gh)rida, Better together! Solving the Android Uncrackable CrackMe Level 2 with . (). Solutions were updated.

  4. 22. ruj 2018.

    Learning a lot of this week with protected APKs. It's amazing how you can leverage the union of (static) and (dynamic). The pic illustrates how to find root checks and disassemble it in Thumb mode. At runtime, we observe string deobfuscation going on

  5. 25. srp 2019.

    Switf5 demangling is now supported on and

    swift-frida is now integrated in r2frida <3
  6. 25. ruj 2018.

    Combo: Spawn the APK + syscall hook (trampoline highlighted) + breakpoint and BINGO! Obfuscators are improving a bit 🎷. This week I am suffering "frida-ddiction"

  7. 8. ruj 2018.

    Amazing talk at by about hacking a game by defeating obfuscation using and

  8. 4. ruj 2019.

    Training finished! We survived the training at ! But we are already thinking in improvings for next year! Thanks for this opportunity! //cc ⁦⁩ ⁦

  9. 4. ruj 2019.

    After some video issues...Lets start training at with and ! //cc

  10. 2. lip 2019.

    📽️Here it is! The recording of my 2h session introducing at , from zero up to and basics. I hope it will be useful. Comments and feedback are totally welcomed :) CC:

  11. 6. ruj 2019.

    Who you gonna' syscall? Reversing hardened iOS apps with

  12. 4. lis 2019.

    Very nice slides about Mobile Pentesting with . Solving the Crackmes and Hacking playground with Frida + Excellent work! 👏

  13. 8. ruj 2017.
  14. 16. ruj 2019.

    For MSTG-STORAGE-10, we used to search for the "owasp-mstg" string written in a password field. In this snippet we map the search results 😝 to their location in the memory regions -> \dm. @@ hit1_* 🧙‍♂️✨

  15. 14. ožu 2017.
  16. 6. ruj 2019.

    The fu***** syscall maistah at the stage in . Lets do some ! //cc

  17. 25. ožu 2019.

    Oneliner of the day

  18. 21. pro 2019.
  19. 24. tra 2019.

    We are about to be live! Use then link and join us. Hear from Radare creator as he conducts a deep dive of r2frida, a framework that combines the best of and

  20. Program update: our last unconfirmed talk is now confirmed! We are happy to welcome for the first time coming with speaking about :-)

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.