SolidSnake

@soolidsnakee

Red teamer, reverse engineering && malware analyses addict. "Kept you waiting huh..."

Vrijeme pridruživanja: travanj 2015.

Tweetovi

Blokirali ste korisnika/cu @soolidsnakee

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @soolidsnakee

  1. Prikvačeni tweet
    25. kol 2019.

    “A man cannot understand the art he is studying if he only looks for the end result without taking the time to delve deeply into the reasoning of the study.” - Miyamoto Musashi

    Poništi
  2. 25. sij

    A 32bit shellcode encoder I wrote some months ago using Z3. Might prove helpful to some.

    Poništi
  3. 23. sij
    Poništi
  4. proslijedio/la je Tweet
    20. sij

    The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr as Hypervisor From Scratch could never have existed without his help and to Alex for patiently answering my questions.

    Poništi
  5. 18. sij

    Sharing my analyses on the recent malware that targeted instances, categorized by as . Using of course 😍😍😍.

    Poništi
  6. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi
  7. proslijedio/la je Tweet
    17. sij

    Juicy... Also proof that not having a CVE doesn't always mean you haven't smashed something...

    Poništi
  8. 7. sij

    “You must understand that there is more than one path to the top of the mountain.” - Miyamoto Musashi. Finally received my cool looking prize 😍 Thank you again . Shout-out to my awesome sister for the picture :).

    Poništi
  9. 10. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    25. stu 2019.

    What? A library that wraps IDA decompiler API and makes it usable? *and* documented? We just released a thing. Blog: Github: Docs!!!:

    Poništi
  11. proslijedio/la je Tweet
    12. stu 2019.

    Shipping soon. We have a lot to ship this year so please be patient.

    Poništi
  12. proslijedio/la je Tweet
    28. ruj 2019.

    We shattered our goal with 5790 registered participants! Big congrats to all the champions! Enjoy that medal and wear it with pride! As will all past years here is a blog with the detailed solutions - so you can practice for next year!

    Poništi
  13. proslijedio/la je Tweet
    24. ruj 2019.

    Just published my writeup for CPU Adventure at DSCTF, wherein me, , and reverse engineered a program written for a completely unknown, custom CPU with no access to the CPU, emulator or any documentation:

    Poništi
  14. proslijedio/la je Tweet
    24. ruj 2019.

    My recent research in collaboration with has just been published! 🚀 We mapped the Russian APT ecosystem by gathering and classifying thousands of malicious samples to detect and analyze code similarities between them. Check it out @

    Poništi
  15. proslijedio/la je Tweet
    23. ruj 2019.
    Poništi
  16. proslijedio/la je Tweet
    3. ruj 2019.

    Happy 21st birthday Metal Gear Solid! 📦

    Poništi
  17. 22. kol 2019.

    1 challenge and I will go back a humain being again

    Poništi
  18. 20. kol 2019.

    HAHAHAHAHAH come onnn guys XDDDD epic

    Poništi
  19. 20. kol 2019.
    Poništi
  20. 19. kol 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·