Ian

@palleiko

Reverse engineering, binary & program analysis, security research. My company is cool but I do not speak for them

Vrijeme pridruživanja: svibanj 2011.

Tweetovi

Blokirali ste korisnika/cu @palleiko

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @palleiko

  1. Prikvačeni tweet
    4. svi 2019.

    and I had other ideas for our badges...

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    16. sij

    RPISEC RE/VR courses through the years:

    Prikaži ovu nit
    Poništi
  3. 12. pro 2019.

    please let me edit the plurality of nouns on my memes

    Prikaži ovu nit
    Poništi
  4. 12. pro 2019.

    Bug bounty reports be like: I've got arbitrary vibration execution on any cell phones if I know as little as a phone number

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    14. stu 2019.

    A lot of people ask my opinion on reverse engineering tools. I don’t have any one in particular I prefer over the others, they’re all good for different uses: 1/4

    Prikaži ovu nit
    Poništi
  6. 7. stu 2019.
    Prikaži ovu nit
    Poništi
  7. 7. stu 2019.

    This malware is metal af

    Prikaži ovu nit
    Poništi
  8. 4. lis 2019.

    Here’s some applied research that will almost definitely make your life easier

    Poništi
  9. 25. ruj 2019.

    Ghidra gang, Ghidra gang, Ghidra gang (Ghidra gang) Spend three racks on hex-rays (Oof) IDA don't love NSA (Yuh) p-code lift bins, I forget tha arch (Brr, yuh)

    Poništi
  10. 23. ruj 2019.

    You know you’ve been looking at too much Android code when you spend 30 mins reversing std::vector code without realizing what it is x_x

    Poništi
  11. proslijedio/la je Tweet

    Looks like WannaCry hit the Israeli / West Bank wall.

    Poništi
  12. 27. kol 2019.

    Solved by -- user error defining a ** as a * :)

    Prikaži ovu nit
    Poništi
  13. 27. kol 2019.

    Why is Ghidra abusing me? Instead of displaying the member at offset 0x18 it's displaying the first member plus the offset.

    Prikaži ovu nit
    Poništi
  14. 16. kol 2019.

    Anyone have preferred ways of performance testing and profiling OCaml code? I've been using gprof and the benchmark library but feel like I'm missing out on something

    Poništi
  15. 11. kol 2019.
    Poništi
  16. proslijedio/la je Tweet
    10. kol 2019.
    Poništi
  17. proslijedio/la je Tweet
    8. kol 2019.
    Odgovor korisniku/ci

    2 plus 2 is 4 minus 1 that's 3 quick maths

    Poništi
  18. 9. kol 2019.
    Poništi
  19. 25. lip 2019.

    ♪ Whose world is this? ♪ ♪ The world is yours, the world is yours ♪

    Poništi
  20. 22. lip 2019.

    OCaml docs teaching me how to efficiently write shitty code one step at a time

    Poništi
  21. proslijedio/la je Tweet
    13. lip 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·