Tim Blazytko

@mr_phrazer

Reverse Engineer and PhD student in Bochum

Vrijeme pridruživanja: studeni 2015.

Tweetovi

Blokirali ste korisnika/cu @mr_phrazer

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mr_phrazer

  1. proslijedio/la je Tweet
    14. sij

    Congratulations Dr. ! 🎉

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    7. sij

    I recently discovered 's channel on YouTube. A lot of stuff about old video game copy protections (arcade, console, PC), emulation, game development, etc. Good production values, too. Great stuff for reverse engineering enthusiasts.

    Poništi
  3. 17. pro 2019.

    Interesting. Themida seems to add some kind of superoptimization

    Poništi
  4. 12. pro 2019.

    Awesome framework that becomes more and more user-friendly

    Poništi
  5. proslijedio/la je Tweet
    23. stu 2019.

    (More to come, it seems) by Cal (@calvinlikesrice ?)

    Poništi
  6. proslijedio/la je Tweet
    20. stu 2019.

    Paged Out! #2 (Nov 2019) is out! And it's free to download :) This issue has 55 articles in 11 categories: Programming OS Internals Assembly Operating Systems GameDev Electronics Security/Hacking SysAdmin Reverse Engineering Algorithms Writing Articles

    Poništi
  7. proslijedio/la je Tweet
    9. stu 2019.

    and I just released our fast coverage measurement tool: Get basic block and edge coverage on binaries using AFL's Qemu mode and a Forkserver.

    Poništi
  8. proslijedio/la je Tweet
    9. stu 2019.

    Cool work on fuzzing binary formats:

    Poništi
  9. proslijedio/la je Tweet
    10. lis 2019.

    If you plan on using Redqueen for your research, you should use this code base for the fronted - it was completely redesigned.

    Poništi
  10. 10. lis 2019.

    We just published the source code of our fuzzer Grimoire: Thanks to my co-authors , , , , and !

    Poništi
  11. proslijedio/la je Tweet
    8. lis 2019.

    I've digged up some ancient versions of Adobe Reader to figure out exactly which symbols were public in which builds and when. Turns out all the core modules had them at some point. My full analysis on the P0 blog:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    3. lis 2019.

    Video for my RECON 2019 talk, "Automation Techniques in C++ Reverse Engineering", is now available:

    Poništi
  13. proslijedio/la je Tweet
    3. lis 2019.

    [BLOG] Exploring Execution Trace Analysis: digging into automation for trace collection and off-line dynamic trace analysis by Luigi ()

    Poništi
  14. proslijedio/la je Tweet
    24. ruj 2019.
    Poništi
  15. proslijedio/la je Tweet
    23. ruj 2019.

    We just published the source code of our fuzzer Redqueen: Thanks to my coauthors and

    Poništi
  16. proslijedio/la je Tweet
    13. ruj 2019.

    The Joern code analysis shell now supports tab completion, command history (+search), pipe operators, and non-interactive scripts: Happy hacking :)

    Poništi
  17. 16. kol 2019.

    Today around 5 pm PDT, presents our paper „GRIMOIRE: Synthesizing Structure while Fuzzing“ at . Check it out!

    Poništi
  18. proslijedio/la je Tweet
    5. kol 2019.

    Here are the slides for my RECON and BlackHat presentation, "Automation Techniques in C++ Reverse Engineering":

    Poništi
  19. 3. lip 2019.

    Our paper "GRIMOIRE : Synthesizing Structure while Fuzzing" can now be found here: CC: and

    Poništi
  20. 31. svi 2019.

    Happy to announce that our paper "GRIMOIRE : Synthesizing Structure while Fuzzing" will be published at Thanks to my co-authors and for their awesome work!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·