Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @JavierYusteM
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JavierYusteM
-
Javier Yuste proslijedio/la je Tweet
1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
This weekend we have to re-read these posts about Russian Cyber Intelligence Community https://www.securityartwork.es/2016/12/07/the-russian-icc-i-introduction-the-russians-are-coming/ … from
@securityartwork ...and also we have to hang this picture. Don't ask us why...#Russia#APT#intelligencepic.twitter.com/nYWgFz3uN5
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
People giving career advice should specify the sample that it's based on. Human nature is to overgeneralize from personal experience, so most advice should be considered suspect for being based on a sample size of 1. That's why there's so much conflicting advice on any topic.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
My thanks to
@HowellONeill for his kind coverage of my upcoming book, The Hacker and the State. It’s exciting to release the book at a moment when cyber operations seem more poised than ever to shape international affairs—for better or for worse.https://www.technologyreview.com/s/614974/hackers-will-be-the-weapon-of-choice-for-governments-in-2020/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
All
@devttyS0's IDA scripts have (finally) been ported to Ghidra. Woohoo!https://github.com/fuzzywalls/ghidra_scripts …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
Somehow I missed there's a whole Ph.D. thesis on symbolic abstraction: https://thakur.cs.ucdavis.edu/assets/pubs/thakur_PHD14.pdf … Looks pretty readable, too.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
When the news broke about BlueKeep exploitation in the wild, most of the reactions were basically "it's not a worm, so it doesn't matter". I decided I'd do a thread on why that's wrong, and why a worm isn't even a worst case scenario. THREAD:
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
Is there interest for something like Lumina for Ghidra? A script that sends FID hashes as queries to a server which returns a function name and signature. An additional script that allows uploading local FID hashes with associated function names and signatures.https://twitter.com/cveiche/status/1191421388478930944 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
Pushed the results of the 160GiB libc collection analysis project to https://github.com/threatrack/ghidra-fidb-repo … The repo now contains Function ID hashes for almost 1M functions. 959055... so close. Anything more to add? More compiler libraries? https://twitter.com/0x6d696368/status/1184176473667706880 …pic.twitter.com/kNWP6uzEgK
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Does adding Microsoft uris bypass something?
#Emotetpic.twitter.com/LLHG3ozSDr
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
Evasive attacks on ML classifiers are scary but we know little about adversarial ML in the problem space: we may need to rethink the whole formalization, incl. optimization and constraints for a principled approach - come and talk to us
@USENIXSecurity poster session#usesec19pic.twitter.com/WxaWElHiWa
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
I just presented my Ghidra plugin at
#BlackHat and pressed the “publish” button in github. Enjoy!https://github.com/radare/ghidra-r2web …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
Automated Deobfuscation of Android Native Binary Code https://arxiv.org/pdf/1907.06828.pdf …pic.twitter.com/1BJadbVBlX
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
During the
@BlackHatEvents USA 2019 Mobile App Security Training we're releasing a plug-in for Ghidra that starts a r2web server and lets multiple r2 instances interact with it. Stay tuned!#BlackHat2019@radareorgpic.twitter.com/gIXU4Ts3Ty
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
Researching obscure architectures sounds challenging to you? We thought so too, so we developed a disassembly and analysis plugin for
#radare2 to make things easier! Read on to learn how we did it.https://alephsecurity.com/2019/07/09/xiaomi-zigbee-2/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
We created a list of community plugins and scripts for Cutter
From malware analysis to code coverage visualizers.
Check it out @ https://github.com/radareorg/cutter-plugins …
We invite you to write more plugins for Cutter following our documentation: https://cutter.re/docs/plugins Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Javier Yuste proslijedio/la je Tweet
My new article has just been published!
Deobfuscating the graphs of Ocean Lotus' (APT32) malware using Cutter and radare2 Python plugins.
Check it out @ https://research.checkpoint.com/deobfuscating-apt32-flow-graphs-with-cutter-and-radare2 … | @radareorg@r2guipic.twitter.com/eEZdvZ9Gv2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Fixing a bug after 48 hours of pain feels so relieving
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Javier Yuste proslijedio/la je Tweet
Quick Tips For Unpacking
Made a quick video tutorial covering how to unpack this sample with a few breakpoints and OllyDbg. We are huge fans of ID-Ransomware, keep up the good work Michael!
https://youtu.be/wkPsvYfA08g
#malware#QuickTips#OpenAnalysisLivehttps://twitter.com/demonslay335/status/1078725790580252672 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.