Scott Knight

@sdotknight

macOS enthusiast. Reverse engineer. Security and malware focused. Tweets are my own.

Vrijeme pridruživanja: srpanj 2010.

Tweetovi

Blokirali ste korisnika/cu @sdotknight

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sdotknight

  1. proslijedio/la je Tweet

    Channeling my frustration at Apple's lack of open sources for Darwin 19 more productively, by bug fixing sources which are out - specifically, the little known but handy (and buggy) lsmp utility:

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Apple’s continuity protocol reverse enginered:

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    For the past few months, I've been diving into Apple's Endpoint Security Framework. This post shares how I use the framework for detection engineering purposes.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    27. sij

    It's official. Join me in Barcelona for . It's time to resolve some mysteries that have gone unaddressed for far too long. ?

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    24. sij

    Hello, guys! Finally, I have released new 3 tools for and for macOS. Please try them and have a nice weekend :) 1st tool: Norimaci is malware analysis sandbox for macOS. This tool was inspired Noriben sandbox. (1/3)

    Prikaži ovu nit
    Poništi
  7. 27. sij

    Seems like it's not something new. Really just 631ac269925bb72b5ad8f469062309541e1edfec5610a21eecded75a35e65680 with some random bytes removed in the middle. Go figure.

    Prikaži ovu nit
    Poništi
  8. 27. sij
    Prikaži ovu nit
    Poništi
  9. 23. sij
    Prikaži ovu nit
    Poništi
  10. 23. sij
    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    22. sij

    [ v3.0 News ] Announcing conf talks: Speakers , , , , et al. will present: ⚙️ os internals 👾 malware analysis 🛠️ tool making/breaking 🐛bug hunting/exploitation ⚠️ Conference will sell out so register today!

    Poništi
  12. 22. sij

    Super excited and honored to be speaking about the Endpoint Security framework at Objective by the Sea this year!

    Poništi
  13. proslijedio/la je Tweet
    18. sij

    New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2.

    Prikaži ovu nit
    Poništi
  14. 21. sij
    Poništi
  15. proslijedio/la je Tweet
    18. sij

    Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    17. sij

    If you are interested in automotive architectures in regards to security, check out this (older) paper we wrote in 2014:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    17. sij

    A Graduate Course in Applied Cryptography (latest version, Jan. 2020) By Dan Boneh and Victor Shoup e-book:

    Poništi
  18. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  19. 9. sij

    Xprotect 2111 was released. Here's a list of hashes that match the three new yara rules.

    Poništi
  20. proslijedio/la je Tweet
    8. sij

    Three new rule families in v2111 for dropped by early yesterday. Some interesting changes in MRT v1.52, too (more on that later!).

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·