Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @vuong200989
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vuong200989
-
kubo proslijedio/la je Tweet
Reverse engineering my router's firmware with binwalkhttps://embeddedbits.org/reverse-engineering-router-firmware-with-binwalk/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
#FakeLogonScreen is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with#CobaltStrike's execute-assembly command. https://github.com/bitsadmin/fakelogonscreen …pic.twitter.com/2pAOk9InLMHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
#pwn2own 2018: Safari +Root exploit https://github.com/ret2/P2O_2018 + paper:https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Windows kernel explorer: A free powerful Windows kernel research toolhttps://github.com/AxtMueller/Windows-Kernel-Explorer …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Friends, Our malware samples have been restructured and are back online. 438,000+ samples. You can view them here: https://vxug.fakedoma.in/samples/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Recommended read on
@Medium: “Reversing Web Assembly (WASM)”https://ift.tt/35t9WI9Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Nice content on Mobile Reverse Engineering http://www.vantagepoint.sg/blog/83-mobile-reverse-engineering-unleashed …
#bugbountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
An effort to build a single place for all useful android and iOS security related stuff.https://github.com/vaib25vicky/awesome-mobile-security …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Next Windows Internals (Remote) Traininghttp://scorpiosoftware.net/2020/01/03/next-windows-internals-remote-training/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Analysis of Jigsaw Ransomwarehttps://x0r19x91.github.io/2020/jigsaw-ransomware …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
So, it's been a while since I posted on my blog, but I had some spare time over the holidays to do a write up on reversing
@MalwareTechBlog's VM1 challenge and writing a custom VM interpreter for it, as well as incorporating YARA into it! Check it out!https://0ffset.net/reverse-engineering/solving-a-vm-based-crackme/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Practical reverse engineering is an awesome book with insightful windows kernel exercises - I decided to complete all of the exercises and post complete write-ups to my solutions

Here's the first one: Reversing AuxKlibQueryModuleInformation
https://repnz.github.io/posts/practical-reverse-engineering/query-module-information/ …pic.twitter.com/Q6pvPmiTlG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Mobile Application Pentesting : Part 1:- https://medium.com/@patilpiyush/mobile-application-pentesting-part-1-596e82e56e83 … Part 2:- https://medium.com/@patilpiyush/mobile-application-pentesting-part-2-feda7659eb12 … Part 3:- https://medium.com/@patilpiyush/mobile-application-pentesting-part-3-a9acbb487e6 … Part 4:- https://medium.com/@patilpiyush/mobile-application-pentesting-part4-329ca80b8e4b … Part 5:- https://medium.com/@patilpiyush/mobile-application-pentesting-part-5-3c83e7f4dfe7 … Part 6:- https://medium.com/@patilpiyush/mobile-application-pentesting-part6-542870ffc5f7 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Reverse Engineering a real world 249 bytes backdoor!https://anee.me/reversing-a-real-world-249-bytes-backdoor-aadd876c0a32 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): https://github.com/0xdidu/Reverse-Engineering-Intel-x64-101 … Hoping to spread the RE fever :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
A nice write-up on WinAFL setup for fuzzing popular image viewers resulting in quite a few bugs.https://www.apriorit.com/dev-blog/644-reverse-vulnerabilities-software-no-code-dynamic-fuzzing …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to
@Dark_Puzzle for answering my questions.https://rayanfam.com/topics/reversing-windows-internals-part1/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
kubo proslijedio/la je Tweet
Uploaded a new challenge. This one is Windows reversing + exploitation.https://www.malwaretech.com/windows-exploit-challenges/user-after-free-1-0 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
kubo proslijedio/la je Tweet
Re-Published my series about debugging the Samsung Android Kernel! https://medium.com/@alex91ar/debugging-the-samsung-android-kernel-part-1-91b55b79d955?source=friends_link&sk=ff27cd2d6ca94bc35fea08c847f6227d … https://medium.com/@alex91ar/debugging-the-samsung-android-kernel-part-2-eab0bbdd6f19?source=friends_link&sk=d76dd15a418d8b2bdb20917b797f1960 … https://medium.com/@alex91ar/debugging-the-samsung-android-kernel-part-3-a6a7f762fcd6?source=friends_link&sk=635b789114be318db3b28e454b4069d7 …
#samsung#debug#kernel Code is also public again! https://github.com/alex91ar/samsung-debug … Enjoy! :)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
v2 of my free Intro to Android App Reverse Engineering workshop is here!