Michael Sikorski

@mikesiko

Dad. Reverse Engineer. Triathlete.

New York, New York
Vrijeme pridruživanja: prosinac 2011.

Tweetovi

Blokirali ste korisnika/cu @mikesiko

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mikesiko

  1. 22. sij

    Great work by and many others to get this out quickly!

    Poništi
  2. 17. sij

    Nice to see how rapidly this came together

    Poništi
  3. proslijedio/la je Tweet
    17. sij

    In which we discuss an actor deploying a mitigation for the Citrix vuln, but also appearing to have a backdoor.

    Poništi
  4. 26. pro 2019.

    It was a big deal and I'm proud to have been a part of it.

    Poništi
  5. 12. pro 2019.

    Check out this tech talk I gave to on Reverse Engineering Ransomware. This makes a great introduction to malware analysis.

    Poništi
  6. proslijedio/la je Tweet
    25. stu 2019.

    An exciting project, I hope it will simplify writing decompiler plugins. We at Hex-Rays probably care too much about all minute details while you guys want a more general view of things. FIDL is a promising bridge.

    Poništi
  7. proslijedio/la je Tweet
    25. stu 2019.

    What? A library that wraps IDA decompiler API and makes it usable? *and* documented? We just released a thing. Blog: Github: Docs!!!:

    Poništi
  8. proslijedio/la je Tweet
    23. stu 2019.

    Just got my prize! This is my first year finishing. Last year I got to 11 and the previous year I got to 12. Thank you and team for the great challenges. I learn so much. I put it by the legos I made from flareon5 challenge 3.

    Poništi
  9. proslijedio/la je Tweet
    22. stu 2019.

    Aww yiss got my prize from . I added the flareon4 prize from last time I participated. Thanks and team.

    Poništi
  10. 21. stu 2019.

    Here is dropping Malware Data Science knowledge Phil is the DS behind the FLARE joint Malware Analysis tool StringSifter

    Poništi
  11. 13. stu 2019.

    I love this Cobra Kai look! I can't wait to wear one.

    Poništi
  12. 15. lis 2019.
    Poništi
  13. proslijedio/la je Tweet
    2. lis 2019.

    I love that the monthly meetings in the FLARE team feel like I'm being paid to sit at my desk and attend a security conference. Makes me wonder.

    Poništi
  14. 28. ruj 2019.

    We shattered our goal with 5790 registered participants! Big congrats to all the champions! Enjoy that medal and wear it with pride! As will all past years here is a blog with the detailed solutions - so you can practice for next year!

    Poništi
  15. proslijedio/la je Tweet
    10. ruj 2019.

    Enjoyed presenting at (the final!) last weekend with , , and twitterless Jay Gibble. Check out this free tool we released - we hope the community finds this to be useful and time/money saving!

    Poništi
  16. 9. ruj 2019.

    StringSifter is now included with FLARE VM! Go for the tool trifecta by installing FLAREVM and then running the FLOSS output through StringSifter!

    Poništi
  17. 9. ruj 2019.

    In case you missed it over the weekend, we released another useful malware analysis tool for FREE. Cheers!

    Poništi
  18. 9. ruj 2019.

    We hit our goal of over 5,000 registered participants in the challenge! Still time to join the biggest RE focused CTF!

    Poništi
  19. 9. ruj 2019.

    With smart planning you can gain a competitive advantage: “Iden—riding a road bike with clip-on aerobars and no water bottles on the uphill”

    Poništi
  20. proslijedio/la je Tweet
    8. ruj 2019.

    Woah, this is really neat. Combined with "smarter strings" like FLOSS, it becomes even more powerful! Looking forward to trying it out 😎

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·