Qais Temeiza

@qaistemeiza

Security Researcher, Reverse Engineering ARM/x86

Bethlehem, Westbank
Vrijeme pridruživanja: lipanj 2013.

Tweetovi

Blokirali ste korisnika/cu @qaistemeiza

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @qaistemeiza

  1. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    PythonAESObfuscate - Obfuscates A Python Script And The Accompanying Shellcode

    Poništi
  3. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  4. proslijedio/la je Tweet
    20. sij

    Happy to announce that you now can find the lecture notes for my Hardware and Embedded Systems Security course online, including tex sources:

    Poništi
  5. proslijedio/la je Tweet
    18. sij

    Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    18. sij

    RPISEC RE/VR Courses: Secure Software Principles , Malware Analysis , Advanced Exploitation and Rootkit Development , Program Obfuscation ,Windows Exploitation , Hardware Reverse Engineering , Modern Binary Exploitation , Malware Analysis: cr

    Poništi
  7. proslijedio/la je Tweet
    17. sij
    Poništi
  8. proslijedio/la je Tweet
    13. sij

    Backdooring an IoT camera by creating a malicious firmware upgrade

    Poništi
  9. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    6. sij

    "Secure Boot in the Era of the T2" by at "This article covers the security properties and technical implementation details of what makes this platform unique."

    Poništi
  11. proslijedio/la je Tweet
    4. sij

    BusKill: A $20 USB dead-man-switch triggered if someone physically yanks your laptop away

    Poništi
  12. proslijedio/la je Tweet
    3. sij

    Reverse Engineering Encrypted Code Segments: by Ryan Cornateanu

    Poništi
  13. proslijedio/la je Tweet
    2. sij

    So, it's been a while since I posted on my blog, but I had some spare time over the holidays to do a write up on reversing 's VM1 challenge and writing a custom VM interpreter for it, as well as incorporating YARA into it! Check it out!

    Poništi
  14. proslijedio/la je Tweet
    1. sij

    If you're goal is to learn how to code in 2020, here's a thread of advice for you 👇🏻

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    30. pro 2019.

    Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code

    Poništi
  16. proslijedio/la je Tweet
    30. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  18. proslijedio/la je Tweet

    Solid secure boot bypass write-up. Particularly keen on the honesty around strings + OS making reverse engineering far quicker.

    Poništi
  19. proslijedio/la je Tweet
    21. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    20. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·