Tetrane

@tetrane

Creator of REVEN-Axion. Software Reverse-Engineering automation, for professionals.

France & USA
Vrijeme pridruživanja: ožujak 2009.

Tweetovi

Blokirali ste korisnika/cu @tetrane

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tetrane

  1. proslijedio/la je Tweet
    29. sij

    présente REVEN au FIC pour l’analyse de vulnérabilité et de malware sur le stand du MINARM

    Poništi
  2. proslijedio/la je Tweet
    24. sij

    This article is dear to me. While Luc ( ) wrote the article and did the in-depth analysis, I did the record of the scenario and the initial analysis with REVEN. It wasn't much, but as primarily a developer this was a small dive in RE and good dogfooding.

    Poništi
  3. 27. sij

    Tetrane will be presenting REVEN at on Wednesday 10.20am and 13.30pm. Join us!

    Poništi
  4. 24. sij

    REVEN's Data Tainting to track back the origin of rsi in BlueKeep vulnerability. Could you be that fast with other RE tools? You get it in 1 min with REVEN:

    Poništi
  5. 23. sij

    Sharing a new demo + an article on BlueKeep dissection (CVE-2019-0708) using REVEN. See how data Tainting, Memory History, and its Python API streamline the RE process to quickly and accurately analyze the root-cause and behavior at the system level.

    Poništi
  6. 22. sij

    Tetrane will be at the next week - The International Cybersecurity Forum (FIC) -

    Poništi
  7. proslijedio/la je Tweet
    9. sij

    Loving reverse? Want to apply your skills using an innovative timeless debugging and analysis tool at a French Startup? Good news then, because we're hiring ! RT appreciated

    Poništi
  8. proslijedio/la je Tweet
    7. sij
    Odgovor korisniku/ci
    Poništi
  9. 17. pro 2019.

    It also illustrates the benefit of backward data flow tainting.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    17. pro 2019.

    This uses our auto-recording feature to start and stop the scenario from inside the recorded VM upon encountering some specific ASM instructions.

    Poništi
  11. 17. pro 2019.

    Timeless Analysis of an out-of-bounds read in a TTF font file using REVEN -2019-1244

    Poništi
  12. 5. pro 2019.

    REVEN 2.3 is out: 32-bit symbols, Current Process Information, and more. Get details:

    Prikaži ovu nit
    Poništi
  13. 27. stu 2019.
    Poništi
  14. 27. stu 2019.
    Poništi
  15. 21. stu 2019.

    "Who's calling? Find out which process made a system call, and get a taste of REVEN's python API! "

    Poništi
  16. 15. stu 2019.

    Your are , come and discover Timeless Analysis for vulnerability & malware analysis.

    Poništi
  17. 13. stu 2019.

    Applying Timeless Analysis to the recent CVE-2019-1347: When a mouse over a file is enough to crash your system. Read our analysis and get your hands on the trace on our new demo platform.

    Poništi
  18. 12. stu 2019.

    You want to get your hands on Timeless Analysis? launches its demonstration platform with a first set of vulnerability or malware analysis and a tutorial.

    Poništi
  19. proslijedio/la je Tweet
    4. stu 2019.

    We want to give a huge thanks to our 64bits sponsors and ! We are glad you have trusted us again this year. Without you wouldn't be possible!

    Poništi
  20. 22. lis 2019.

    We are happy to be at this week ping or

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·