Dennis

@pat0is

reverse engineer

Uninhabitable Planet
Vrijeme pridruživanja: kolovoz 2017.

Tweetovi

Blokirali ste korisnika/cu @pat0is

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pat0is

  1. prije 23 sata

    Dystopian music playing. The year is 2020. Defenders finally realized effectivity and efficiency as their weapons of choice. Not. The End.

    Poništi
  2. proslijedio/la je Tweet
    30. sij
    Poništi
  3. proslijedio/la je Tweet
    26. sij

    AV stands for: Additional Vulnerabilities

    Poništi
  4. proslijedio/la je Tweet
    26. sij

    'Opening from Glasswork' 279 char. Code in next tweet.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    19. sij

    Does anyone have a Diesel Mercedes car that went through the "mandatory software update" ()? I'm curious about engine ECU firmware versions before vs. after. Please PM (or email) me if you know anything!

    Poništi
  6. proslijedio/la je Tweet
    17. sij
    Poništi
  7. 8. sij

    I've worked on some of the X-MAS CTF challanges myself along with work mates and enjoyed writing an emulator for the "Emu 2.0" challenge in particular. Added disassembler and minimalistic debugger on top ;-)

    Poništi
  8. 8. sij

    "Pushy" - Neat ctf challenge from xmas-ctf 2019:

    Poništi
  9. proslijedio/la je Tweet
    2. sij

    Friends, 40Hex Magazine is now live. This is one of the earliest virus e-zines, with a starting date of 1991, with it officially ending sometime 1993.

    Poništi
  10. proslijedio/la je Tweet
    27. pro 2019.

    Friday night tweetin' for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.

    Poništi
  11. proslijedio/la je Tweet
    15. pro 2019.
    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    9. pro 2019.

    Come work with and me! :-) It'll be great! (or so we hope :-)

    Poništi
  13. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  14. proslijedio/la je Tweet
    3. pro 2019.

    Today marks the release of the debugging and tracing library I have intermittently worked on over the years. The name is a tribute to the interface that has so generously provided us with local privilege escalation for several decades. May it be of use.

    Poništi
  15. 29. stu 2019.

    i could tweet this all day:🍿

    Poništi
  16. proslijedio/la je Tweet
    26. stu 2019.

    Reverse engineers are usually very smart guys, that would surprise me :)))

    Poništi
  17. 26. stu 2019.

    Adding just a few more lines to this () heavily commented code gives you interesting results -> Filter the comments tab by keywords such as "signed". "Why again would a memcpy() take a signed "count" argument?" 🤨 Yes, it finds real bugs :)

    Poništi
  18. 26. stu 2019.

    Note to self: A reverse engineer is someone who can't comprehend hexrays.hpp but only machine code instead.

    Poništi
  19. 23. stu 2019.

    My IDAPython projects IDACyber, IDAPyHelper, Mrs.Picky, xray and genmc have been ported to Python3 on GitHub. Separate Python2 forks (for IDA versions older than 7.3) are available but will no longer be maintained. More to come...

    Poništi
  20. proslijedio/la je Tweet
    28. lis 2019.

    I built an iOS kernel debugger called KTRW based on a KTRR bypass for the iPhone X. It is capable of patching kernel __TEXT_EXEC, loading kernel extensions, and performing single-step kernel debugging with LLDB and IDA Pro over USB:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·