domas

@xoreaxeaxeax

// hacker math & stuff // M/o/Vfuscator // sandsifter // project:rosenbridge // ..cantor.dust.. // REpsych // the memory sinkhole // nightshyft //

Vrijeme pridruživanja: travanj 2015.

Tweetovi

Blokirali ste korisnika/cu @xoreaxeaxeax

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @xoreaxeaxeax

  1. 9. kol 2018.

    GOD MODE UNLOCKED: hardware backdoors in some x86 CPUs White paper coming tomorrow.

    Poništi
  2. 10. sij 2018.

    So is branchless computation hardened against and ? Here's a secure, branchless DOOM ... 7 hours in, 1 frame rendered.

    Poništi
  3. proslijedio/la je Tweet
    31. kol 2017.

    VIDEO: “Breaking the x86 Instruction Set” by 2017 Briefing presentation

    Poništi
  4. 28. srp 2017.

    sandsifter results: secret instructions; bugs in IDA, gdb, VS, valgrind, capstone, qemu; flaws in hypervisors; critical hardware locks; etc.

    Poništi
  5. 28. srp 2017.

    new project: sandsifter x86 processor fuzzer; exposes hidden instructions in x86;

    Poništi
  6. 22. srp 2017.

    I'll be demonstrating the first x86 'killer poke' instruction found in 20 years at next week; processor DoS from ring 3

    Poništi
  7. 24. lip 2016.

    copy/paste/search/replace are turing-complete so, brainf@!# interpreter, in vanilla vim.

    Poništi
  8. 17. lip 2016.

    Hmm. All programs reduce to the same instruction stream. Left, AES; right, Minesweeper.

    Poništi
  9. 1. lis 2015.
    Poništi
  10. 1. lis 2015.
    Poništi
  11. 1. lis 2015.

    XADD-, SBB-, ADC-, and PUSH/POP- fuscators...

    Poništi
  12. 1. lis 2015.
    Poništi
  13. 1. lis 2015.
    Poništi
  14. 1. lis 2015.
    Poništi
  15. 1. lis 2015.

    x86 SUB is turing complete, so here's the SUBfuscator - compiles C into subs, and only subs:

    Poništi
  16. 25. ruj 2015.

    x86 XOR is turing complete, so here's the XORfuscator - compiles C into xors, and only xors:

    Poništi
  17. 24. ruj 2015.

    M/o/Vfuscator updated with instruction & register shuffling to prevent (simple) decompilation

    Poništi
  18. 17. kol 2015.

    M/o/Vfuscator2 includes a mov-only floating point emulator. So I built a 3d graphics engine. Here's a spinning cube:

    Poništi
  19. 13. kol 2015.

    (i.e. how to talk to a reverse engineer)

    Poništi
  20. 13. kol 2015.

    REpsych: steganography, obfuscation, and psychological warfare via control flow graph manipulation, now on github:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·