sanguinawer

@sanguinawer

Reverse VM analyst CTF Player

españa
Vrijeme pridruživanja: veljača 2007.

Tweetovi

Blokirali ste korisnika/cu @sanguinawer

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sanguinawer

  1. 9. sij

    tnx team, 's biggest prize ever

    Poništi
  2. proslijedio/la je Tweet
    28. pro 2019.

    The whole r2wars competition playlist is now public! (includes the game explanation and bot presentations from the participants)

    Poništi
  3. proslijedio/la je Tweet
    12. pro 2019.
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    12. pro 2019.

    This blog post from also explains very well how this game works and the techniques used to win PD: The game is opensource, and it's available here: thanks to !!

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    1. lis 2019.

    Mobile Pentesting with Frida - What students should bring @ NavajaNegra Conference /cc

    Poništi
  6. proslijedio/la je Tweet
    27. ruj 2019.

    I contributed a kernel pwnable challenge to the r2con 2019 CTF organized by and . Unfortunately it went unsolved... I've pushed it to , and will later update source code and [even later] exploit. Let me know if you give it a try!

    Poništi
  7. proslijedio/la je Tweet
    23. ruj 2019.

    I'm really glad to say that my plugin -deREferencing- just won the 2nd place at Hex-Rays Plugin Contest 2019 !! \o/

    Poništi
  8. proslijedio/la je Tweet
    14. ruj 2019.

    I've published my r2wars 2019 challenge writeup:

    Poništi
  9. proslijedio/la je Tweet
    13. ruj 2019.

    I just released deREferening: An IDA Pro plugin that implements more user-friendly register and stack views.

    Poništi
  10. 13. ruj 2019.

    g=c800:5 if you know what it does, you are too old;)

    Poništi
  11. proslijedio/la je Tweet
    7. ruj 2019.
    Odgovor korisnicima

    “r2wars is a game similar to corewars, where 2 programs run on a shared memory space trying to catch each other in order to trash their code and make them crash.”

    Poništi
  12. proslijedio/la je Tweet
    9. ruj 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    Be my guest, the slides from the conference "Street Fight 30th Hacking Edition : A journey into Moo" are here : cc

    Poništi
  13. proslijedio/la je Tweet
    7. ruj 2019.

    At we were wondering why an r2wars bot took so long with so much code. Turns out it was a call for a refreshing beverage !

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    6. ruj 2019.

    Understanding ESIL emulation by

    Poništi
  15. proslijedio/la je Tweet
    6. ruj 2019.

    No excuses not to use Cutter guys: Ghidra decompiler is now **embedded** and usable from Cutter and r2! Amazing talk and surprise by & 👏 (no Ghidra install required + no known backdoors)

    Poništi
  16. proslijedio/la je Tweet
    5. ruj 2019.

    Leak from . You should be here. BTW: Developing internals and Cutter training was AWESOME. Muchas Gracias!

    Poništi
  17. proslijedio/la je Tweet
    5. ruj 2019.

    Tomorrow and me will be presenting at about reverse engineering Moo, the emulator 🕹️ used inside Street Fighter 30th Anniversary Collection, SNK 40th Anniversary Collection, Arcade1UP PCBs, etc... don't miss our talk! 🙂

    Poništi
  18. proslijedio/la je Tweet
    30. kol 2019.

    Is everyone ready for the r2con CTF? It starts in 2h...

    Poništi
  19. 29. kol 2019.

    great challenges, if you want to learn about RE don't miss it. Congrats team.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·