Tweetovi

Blokirali ste korisnika/cu @rh0main

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rh0main

  1. Prikvačeni tweet
    4. tra 2017.

    Glad to open-source with LIEF: a library to parse and manipulate executable formats:

    Poništi
  2. proslijedio/la je Tweet
    18. sij

    presents dynamic binary instrumentation techniques that can help reverse engineers deal with obfuscated codes. Learn how these techniques aim to be obfuscator resilient so it doesn’t rely on a special kind of obfuscation in this Briefing

    Poništi
  3. proslijedio/la je Tweet

    And among others projects and FLOSS audits makes, we can point you to and QBDI projects :)

    Prikaži ovu nit
    Poništi
  4. 10. sij

    Glad to announce that I'll speaking at Black Hat Asia about native code (de)obfuscation on Android!

    Poništi
  5. 18. pro 2019.

    It's probably well-known but I discovered which is a nice alternative to Android Xref.

    Poništi
  6. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  7. 26. stu 2019.

    (2/2) The scripts are available on the repository:

    Prikaži ovu nit
    Poništi
  8. 26. stu 2019.

    (1/2) Here is my analysis of Tencent's Legu: Most of the analysis was done thanks to open source tools: - Frida (devkit) for hooking - QBDI (AArch64) for memory traces and instruction traces - Kaitai struct for reverse engineering the custom formats

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    24. stu 2019.

    LIEF 0.10.0 is out and Python wheels are available on Pypi. Enjoy!

    Poništi
  10. proslijedio/la je Tweet
    18. stu 2019.

    Sourcetrail is now free and open-source! 🥳 The source code is available on GitHub: If this catches you by surprise, read our blog post on why we made this change and how we will continue:

    Poništi
  11. 14. stu 2019.
    Poništi
  12. proslijedio/la je Tweet
    6. stu 2019.

    Isolating the logic of an encrypted protocol with LIEF and kaitai

    Poništi
  13. proslijedio/la je Tweet
    31. lis 2019.

    Releasing a new version of Cemu: 0.5 - Impish Tradition. Many cool new features, including more customization and now the possibility to create ready-to-run PE files directly from assembly (thanks to ) Check it out:

    Poništi
  14. proslijedio/la je Tweet
    29. lis 2019.
    Poništi
  15. proslijedio/la je Tweet
    24. lis 2019.

    [BLOG] Analysis of Qualcomm Secure Boot Chains Nice work by Elouan during his internship: congrats :)

    Poništi
  16. proslijedio/la je Tweet
    10. lis 2019.

    Quarkslab internships season is now open: Want to have fun with development, reverse, crypto, static and dynamic analysis, emulation, unpacking? Read the post, apply, join, and we will both learn a lot.

    Poništi
  17. proslijedio/la je Tweet
    3. lis 2019.

    [BLOG] Exploring Execution Trace Analysis: digging into automation for trace collection and off-line dynamic trace analysis by Luigi ()

    Poništi
  18. 1. lis 2019.

    I pushed my **early** work on the implementation of Mach-O signature in LIEF. It still requires lot of enhancements though. cc

    Poništi
  19. proslijedio/la je Tweet
    1. lis 2019.

    After more than 1 year, we are glad to announce the release of Triton v0.7 - AArch64 semantics, Android compilation, Python 3.6, bug fixes and much more! is already working on the v0.8 and have some surprises in store =)

    Poništi
  20. proslijedio/la je Tweet
    10. ruj 2019.

    [BLOG+TOOL] QBDI 0.7.0 Add X86, android-X86, android-X86_64 and a use case on Tencent Packer.

    Poništi
  21. 9. ruj 2019.

    "tracing is now part of the minimum toolkit that WBC analysts should exploit [...]" This one of the challenges we try to address with QBDI

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·