-
Analyzing WhatsApp Calls with Wireshark, radare2 and Frida https://medium.com/@schirrmacher/analyzing-whatsapp-calls-176a9e776213 …
#WhatsApp#radare2 -
Usaremos herramientas como
#GRR,#SleuthKit y#radare2 para adquirir y analizar artefactos forenses y#malware.https://twitter.com/rootedcon/status/1223198991761973249 …
-
Idk when the layouts interface was added to
#radare2, but holy fuck what have I been doing with my life? -
YARASAFE - Automatic Binary Function Similarity Checks with Yara http://feedproxy.google.com/~r/PentestTools/~3/Oj-R3rE4Nqs/yarasafe-automatic-binary-function.html …
#Binary#IDAPro#IDAProPlugin#Malware#Plugin#Radare2 -
#Radare2: 4.2.0 - Arctic World Archive [Released] by@radareorg#CPReleases#Radare2#ReverseEngineering#Linux#Python#CyberSecurity#Disassembler#Debbuger -
NowSecure OSS Connect 2019 conference talks are now online! (June 3-4 in DC) https://www.nowsecure.com/blog/2019/05/16/get-the-inside-track-on-presenter-session-details-for-nowsecure-connect19/ … …
#radare2#frida#opensource#MobileSecurity#mobileappsecpic.twitter.com/X0Hm7cAS9v
-
Great blogpost! I've encountered some issues indeed while opening files in OSX Catalina recently, see this comment https://github.com/PAGalaxyLab/vxhunter/issues/9#issuecomment-570212920 … and the one just below... OSX Catalina returns two fields instead of one while using
#radare2's oj* command (open file and show json meta). -
My 99th answer on RE:StackExchange https://reverseengineering.stackexchange.com/a/22975/18014
#ghidra#radare#radare2#disassembly -
The
#r2jp#radare2 test plan for#Linux servers in #2019 will be based on@debian using#ELTS OS base (NOT#LTS), focusing on versions & architectures as per defined in the#Debian guideline: https://wiki.debian.org/LTS/Extended cc:@trufae@radareorg@akochkov@unixfreaxjp@tessy_jp@sonodampic.twitter.com/8IlKvGBzYn
-
Understanding buffer overflows using Radare2 https://rderik.com/blog/understanding-buffer-overflows-using-radare2/ …
#Radare2 -
,
@chihebchebbi201 explains How to Perform Static#Malware Analysis with#Radare2 http://ow.ly/I5g330q6vjI -
,
@chihebchebbi201 explains How to Perform Static#Malware Analysis with#Radare2 http://ow.ly/8eus30q6vjp -
,
@chihebchebbi201 explains How to Perform Static#Malware Analysis with#Radare2 http://ow.ly/AEOv30q6vhW -
,
@chihebchebbi201 explains How to Perform Static#Malware Analysis with#Radare2 http://ow.ly/HXHu30q6vj8 -
The r2 tests in #2020 for
#BSD platform is also expanded to#OpenBSD &#NetBSD under same condition, released version only. PS: Please archive your installed legacy BSD#radare2, ping me to Q/A to check what ver best for debugging etc, will help if I can. Thanks! Cc@radareorghttps://twitter.com/malwaremustd1e/status/1211930394628509697 … -
-
#radare2 is cool but learning curve is terrible pic.twitter.com/76yVh5U2x6
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.