Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @kongo_86
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @kongo_86
-
k0Ng0 proslijedio/la je Tweet
If you are into C++ reverse engineering and never tried OOAnalyzer you are missing out big time! https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
k0Ng0 proslijedio/la je Tweet
The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr
@PetrBenes as Hypervisor From Scratch could never have existed without his help and to Alex@aionescu for patiently answering my questions.https://rayanfam.com/topics/hypervisor-from-scratch-part-7/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
Analyzed with
@vm_call and offered improvements to BattlEye's VM detection. It was surprising this was their only method to detect generic hypervisors. https://vmcall.blog/battleye-hypervisor-detection/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
Essential know-how about PDB
#malware#DFIRhttps://www.wintellect.com/pdb-files-what-every-developer-must-know …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
BattlEye, a popular anti-cheat, has been detecting unknown cheats by using heuristics in combination with the x86 trap flag. This was done to specifically target "The Perfect Injector" by
@_can1357 from usermode. https://vmcall.blog/battleye-kernel-single-step/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
Links: Part 1: https://chrissanders.org/2018/05/large-captures1-colorizing-wireshark/ … Part 2: http://chrissanders.org/2018/05/large-captures2-proto-hierarchy/ … Part 3: http://chrissanders.org/2018/05/large-captures3-distillation/ … Part 4:https://chrissanders.org/2018/06/large-captures4-filter-whittling/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
If you're at
#FloCon20 come say hi to me! At 930am on Wednesday I'll be presenting recent@corelight_inc researchpic.twitter.com/lSPgSNvYMv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
k0Ng0 proslijedio/la je Tweet
Friends, I advise you check out
@hh86_ 's Senshi.B. -parasitic direct action infector of PE exe -new EPO for AMD64 files, hooks the CFG function -last section appender -CRCs instead of API names and more. Its a work of art. https://github.com/86hh/POC-viruses/blob/master/Senshi.A/SENSHI.ASM … 1luv -smelly__vxHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Remembered all my passwords!... Logging off.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
So, it's been a while since I posted on my blog, but I had some spare time over the holidays to do a write up on reversing
@MalwareTechBlog's VM1 challenge and writing a custom VM interpreter for it, as well as incorporating YARA into it! Check it out!https://0ffset.net/reverse-engineering/solving-a-vm-based-crackme/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
Analysis of
#FIN8#PoSlurp payload relevant to VISA fuel pump report (incident 2): https://norfolkinfosec.com/fuel-pumps-ii-poslurp-b/ … I put the payload on VT (for static analysis): 3d5ae56c6746e0b3ed5b15124264a0d2 Credit to@just_windex for initial shellcode. cc@DrunkBinary@cyb3rops for tracking/sigspic.twitter.com/LL3uCJht9F
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Two weeks of not touching a computer. I think now I'm starting to miss it. Can't wait to be back.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
A nice analysis of a NTCrypt PE crypter from
#reverseengineering#itsec#hacking#cybersec#malware@ReversingLabs@ap0xhttps://blog.reversinglabs.com/blog/the-hunt-for-ntcrypt-exposing-a-malicious-packer …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): https://github.com/0xdidu/Reverse-Engineering-Intel-x64-101 … Hoping to spread the RE fever :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
If you're interested in getting started with PANDA for debugging and reverse engineering, Tim Leek put together a short introductory course!https://github.com/panda-re/panda_class …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
Here's the video for one of my fave talks that I gave this year!
I cover 60 slides of code in 30 min as I explain all the obfuscation used by the #Android botnet, Nicro, at@reconmtl. Who knew Java could be so fun?! https://recon.cx/media-archive/2019/Session.005.Maddie_Stone.The_path_to_the_payload_Android_Edition-J3ZnNl2GYjEfa.mp4 … Slides: https://github.com/maddiestone/ConPresentations/raw/master/REcon2019.PathToThePayload.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
Looking for a python challenge over the holiday break? Here is my python CTF challenge that can be solved more than one way:https://github.com/malware-unicorn/BeatSaberCTFChallenge …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
k0Ng0 proslijedio/la je Tweet
https://sandboxescaper.blogspot.com/2019/12/chasing-polar-bears-part-one.html … Here is part one. Pretty sure the attack surface described has many more bugs (not just the vmware tools installer.. I doubt this bug is exploitable in the first place, just wanted something to demo that is unpatched, easier for folks to learn!)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.


