mitp0sh ( みとぽしゅ )

@mitp0sh

Keepin' assembly calm

botswana
Vrijeme pridruživanja: ožujak 2013.
Rođen/a 23. veljače

Tweetovi

Blokirali ste korisnika/cu @mitp0sh

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mitp0sh

  1. Prikvačeni tweet

    I finally wedded IDA v7.0 and REST using Rust yesterday evening! Unbelievable!! Don't know yet whether this is an unholy thing to do but stay tuned ;-D. Was quite a journey with almost zero Rust knowledge as a starting point, I can tell ya...

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 12 sati

    pro tip : you can force pointer size when you choose a custom data type i.e. "my_struct_t *32" in a 64bit project. 🤘

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    My x86 bootloader written in now also supports long mode. Protect mode is still supported. So, it can now boot a kernel formatted with ELF32 or ELF64 on legacy BIOS.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  5. proslijedio/la je Tweet
    1. velj

    Heading to RSA/BSidesSF? I have free passes to FuzzCon where I’ll be keynoting. It’s my first time being around for RSA, let’s hang out, are there activities I should I be sure to to do?

    Poništi
  6. 31. sij

    If you ever see a 0day of mine for a product, I promise it all was because of TB16, its' design and maintenance!!!! Are you nuts guys, unfreakin' believable!?

    Poništi
  7. 30. sij
    Poništi
  8. proslijedio/la je Tweet
    29. sij

    If you are into C++ reverse engineering and never tried OOAnalyzer you are missing out big time!

    Poništi
  9. proslijedio/la je Tweet
    28. sij

    Just put together our recent struggle to solve the type equality problem in LLVM. I would love to hear some feedback from LLVM folks:

    Prikaži ovu nit
    Poništi
  10. 27. sij

    Worst is, I need to recompile clang again. What a waste of life-time!!!!!

    Prikaži ovu nit
    Poništi
  11. 27. sij

    Honestly, building clang/linker to enable use of -flto is so fucking badly documented...and what is available documentation wise is either wrong or incomplete or lacks explanation. I am so close to write a blog post about it - and yes that is a threat!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    27. sij

    [CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU

    Poništi
  13. proslijedio/la je Tweet
    26. sij

    I should mention I'm hiring security engineers both in Sunnyvale and Zürich. Come shape how we do automated security scanning at Google, and find more bugs in a hour than all bughunters combined in a day.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    26. sij
    Poništi
  15. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  16. proslijedio/la je Tweet
    24. sij

    AFL++ now tries to prevent coverage map collisions at link time. Pretty nice work

    Poništi
  17. proslijedio/la je Tweet
    24. sij

    My conjecture* for 2020. An 𝗲𝘅𝗽𝗼𝗻𝗲𝗻𝘁𝗶𝗮𝗹 increase in the # cores available to your favourite fuzzer yields a 𝗹𝗶𝗻𝗲𝗮𝗿 increase in coverage achieved (or # bugs found) after a fixed time budget. Maybe less. *Give me counter-evidence!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    23. sij

    Can’t wait for Picard tomorrow

    Poništi
  19. proslijedio/la je Tweet
    22. sij

    Finally uploaded video of my talk "Expanding the Reach of Fuzz Testing", which I gave at UMass Amherst! Introduces PerfFuzz, FuzzFactory, FairFuzz, Zest + JQF, RLCheck and Autopandas 😃

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    20. sij

    Workshop on Software Attacks and Defenses SAD 2019 CfP open (February 28th 2020, Conf June 19th) [Merge of SPRO and SPREW conferences] @ Genova, Italy

    Poništi
  21. proslijedio/la je Tweet
    19. sij

    DifFuzzAR Automatic Repair of Java Code with Timing Side-Channel Vulnerabilities

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·