Tweetovi

Blokirali ste korisnika/cu @shamrockhoax

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @shamrockhoax

  1. proslijedio/la je Tweet
    prije 12 sati

    So this morning I am reading two papers on graph structuring for decompilation side-by-side: Cifuentes 96 classic () and the 2015 NDSS DREAM paper. (). Both papers are quite good, but ...

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    3. velj
    Poništi
  3. proslijedio/la je Tweet
    29. sij
    Poništi
  4. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    29. sij

    Here's the bibliography for an automatic exploit generation talk I'm giving tomorrow. If you're looking for a reading list on the topic, this should have almost everything for historical context and state of the art

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    26. sij

    If you're a grad student interested in security/program analysis and looking for something fun, I would love to see someone revisit the APEG problem (posed by Brumley in ). There's *at least* one entire PhD worth of problems in that area.

    Poništi
  8. 26. sij
    Poništi
  9. proslijedio/la je Tweet
    24. sij
    Odgovor korisniku/ci

    The modern query-based architecture for compilers (the pull-model) in addition to just the regular pipeline architecture (the push model) There's a great video about this from a couple of years ago that introduced me to the difference:

    Poništi
  10. proslijedio/la je Tweet
    23. sij

    New article! Anti-virus Exploitation: Malwarebytes 4.0.4 - Protection Not Found - Hijacking Malwarebytes via COM IPC

    Poništi
  11. proslijedio/la je Tweet
    22. sij

    Earlier today we published the details of a set of vulnerabilities in Safari's Intelligent Tracking Prevention privacy mechanism: . They are... interesting. [1/9]

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    18. sij

    Windows kernel explorer: A free powerful Windows kernel research tool

    Poništi
  13. 18. sij

    I got annoyed and created a VS2017 property sheet to help with building Intel Pintools outside of the MyPinTool directory:

    Poništi
  14. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi
  15. proslijedio/la je Tweet
    17. sij

    Here’s an IDAPython script that I have been using to populate comments and enum constants for Windows Crypto API. I still need to figure out how to search by constants by name, populate enums with multiple values and add more APIs but it’s still useful.

    Poništi
  16. proslijedio/la je Tweet
    16. sij

    If you’re tired of hearing about crypto32, elliptic curves, and other CVE-2020-0601 shenanigans, have a read over our new blog post on Windows’ Intel CET implementation in the face of SetThreadContext and NtContinue. Come for the exploit mitigation, stay for the XState Internals.

    Poništi
  17. proslijedio/la je Tweet
    12. sij
    Poništi
  18. proslijedio/la je Tweet
    26. pro 2019.
    Odgovor korisnicima

    You can download my work freely from GitHub. (sorry, it's only in Spanish)

    Poništi
  19. proslijedio/la je Tweet
    8. sij

    Linux Kernel Runtime Guard (LKRG) bypass collection by Ilya Matveychikov, CC

    Poništi
  20. proslijedio/la je Tweet

    We identified significant changes to attack methodology against users: ✔️ homemade macOS malware ✔️ authentication mechanism for next-stage payload ✔️ next-stage payload loaded w/o touching the disk ➕ change of Win malware Details ⇒

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·