Paul Makowski

@myhndl

CTO & Tweets are mine. Unless they're good, then they're probably someone else's.

San Diego
Vrijeme pridruživanja: kolovoz 2009.

Tweetovi

Blokirali ste korisnika/cu @myhndl

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @myhndl

  1. proslijedio/la je Tweet
    1. velj

    One of the better ideas I have heard of how social media companies can deal with state organs is to ban accounts tied to governments that don't allow free access to said social media site. If normal Chinese citizens can't post to Twitter/FB, the CCP shouldn't either.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    2. ruj 2019.

    Want to learn but don't know where to begin? Check out my online course designed for beginners starting off in @ ! We cover everything from Assembly and Banking Trojans to Word Macros and Unpacking! 🔒

    Poništi
  3. proslijedio/la je Tweet
    28. stu 2017.

    things you hoped weren’t technically Turing-complete, but they are: MPEG-4 audio

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    30. sij

    HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  7. proslijedio/la je Tweet
    23. sij

    Guys I’m really excited to announce that Bryan and I are teaching courses open to the public! Tickets are live as I tweet. We’ll be adding more advanced Ghidra and classes in the near future. Find me at and chat me up!

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    22. sij

    This FTI forensics report is not very strong. Lots of odd circumstantial evidence, for sure, but no smoking gun. The funny thing is that it looks like FTI potentially has the murder weapon sitting right there, they just haven't figured out how to test it.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    22. sij

    RUMINT: Ghidra debugger module is in alpha testing; should work out of the box with gdb 8.0.1; more configuration required for Windows

    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Earlier today we published the details of a set of vulnerabilities in Safari's Intelligent Tracking Prevention privacy mechanism: . They are... interesting. [1/9]

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    22. sij
    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    20. sij

    Do you want uncoordinated disclosure? Because if your bug bounty program bans publication, you're setting a price on people's willingness to stay quiet. If they disagree with that price or that principle and you don't have an alternative path, you'll get uncoordinated disclosure.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    19. sij

    Three things in life are constant: death, taxes, and exploitable memory-corruption vulnerabilities in any C/C++ codebase longer than a couple thousand lines long

    Poništi
  14. proslijedio/la je Tweet

    Strong device encryption protects all Americans from cyber threats—new vulnerabilities, like the backdoor sought by the FBI, undermines everyone’s security. Weakening encryption won’t stop criminals and terrorists, as I wrote in last month. ()

    Poništi
  15. proslijedio/la je Tweet
    17. sij

    Short Thread: staying with some friends and last night after everyone went to bed I could not figure out how to turn off the large ceiling light in their living room. There is a wall controller that seemed fairly straightforward.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    17. sij

    Vulnerability severity levels

    Poništi
  17. proslijedio/la je Tweet
    17. sij
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    16. sij

    Zelda OOT speedruns in 2020: "yeah we just manipulate the heap by lifting rocks to exploit a use-after-free and rewrite a function pointer to jump into a multi stage payload involving Link's name and the buttons pressed on controllers 1 and 3"

    Poništi
  19. proslijedio/la je Tweet
    14. sij

    I'm disappointed to see no one called CVE-2020-0601 Let's Decrypt. Anyway, bed.

    Poništi
  20. proslijedio/la je Tweet
    15. sij
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·