Twitter | Pretraživanje | |
Alexei Bulazel
Security Researcher | Alumnus | Hacker-In-Residence
2.484
Tweetovi
541
Pratim
4.357
Osobe koje vas prate
Tweetovi
Alexei Bulazel proslijedio/la je tweet
Matt Graeber 10 h
The video for my 2019 talk, "Using WPP and TraceLogging Tracing to Facilitate Dynamic and Static Windows RE" is available. Video: Slides: Data sources... data sources everywhere...
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
Ian 12 h
's paper review series is sweet! Lots of small fun facts as well. For example, 16 bit register variants are slower than their 64 bit counterparts
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
Rachel Greenstadt 14 h
Are you interested in serving on the USENIX Security 2021 program committee? Let us know!
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
Tim Blazytko 18 h
Do you wanna learn about code (de)obfuscation, SMT-based program analysis, symbolic execution or program synthesis? Then come to my software deobfuscation techniques training at :
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
REcon 19 h
I dare you to click
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
REcon 19 h
Recon 2019 video have been released
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel 6. velj
Phi nodes are the Schrödinger's cat of program analysis
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
Infiltrate 5. velj
Speaker Highlight: Amy Burnett() will be presenting 'Diverting the Exploit Flow: On Browser Mitigation Effectiveness'
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
daveaitel 5. velj
If you come to infiltrate this year you can hear her speak live :)
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel 5. velj
“For sale: patched exploit, never thrown” - Ernest Heming0day
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
CVE_ebooks 5. velj
A Haiku wrote an exploit today plan to sell it for millions a collision with p0
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
vx-underground 4. velj
Friends, has been incredibly generous and have offered to aid us in our malware packaging. Moving forward, we will be introducing changes to our malware set to conform with their naming conventions. Thank you from the bottom of my heart, Polyswarm. I am in your debt.
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel 3. velj
Odgovor korisniku/ci @carste1n
I guess it’s not quite analogous, but it has the same energy.
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel 3. velj
Odgovor korisniku/ci @carste1n
Debugging ROP chains with strace
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
DnDeej 2. velj
Twitter algorithm crash course: This tells This tells This keeps Twitter them who a post that a will likely visible for post is enjoy it longer engaging 👇 👇 👇
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
itszn 3. velj
Odgovor korisniku/ci @n0ps13d
You can still play it now here:
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel 2. velj
Looking forward to using this Yeti thermos. Awesome prize for completing their RE/exploitation challenge at
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
Enno Rey 2. velj
Odgovor korisniku/ci @WEareTROOPERS @_dirkjan i 7 ostali
Legend talks (6): My Favorite Things (starts at 2:30)
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel proslijedio/la je tweet
Andrew Barnas 1. velj
Not having access to your own published paper is peak academia.
Reply Retweet Označi sa "sviđa mi se"
Alexei Bulazel 1. velj
ShmooCon 2020: alum Austin Ralls talks about analyzing Android applications with Binary Ninja
Reply Retweet Označi sa "sviđa mi se"