| Tweetovi |
|
julian
@_SYS_V
|
28. sij |
|
用户账户控制 = User account control
自动获取管理员权限失败,请手动确认 = failed to automatically obtain administrative permissions, please manually confirm
|
||
|
|
||
|
julian
@_SYS_V
|
24. sij |
|
新年快乐,大家!祝你们鼠年吉祥!
虽然春节开始了,在外国学习的中国留学生不可以回家。有一点困难,我觉得。加油!还有,我希望疫情早日结束,也希望感染人都尽快康复
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
Intezer
@IntezerLabs
|
20. sij |
|
Our Research Team has recently found newer undetected variants of #Rekoobe, a #Linux Trojan initially discovered in 2015 with a complex authentication mechanism. Read the technical analysis by @ulexec
hubs.ly/H0mF7T50 pic.twitter.com/jNK06sVWyv
|
||
|
|
||
|
julian
@_SYS_V
|
18. sij |
|
I'm not sure if that would work. The program is expecting 2 arguments, the second of which is the pathname of the file to open and read. If you are able input the data to the program that way and get it to run successfully, let me know
|
||
|
|
||
|
julian
@_SYS_V
|
18. sij |
|
Thank you! Much appreciated
|
||
|
|
||
|
julian
@_SYS_V
|
18. sij |
|
Automatically generating solutions to a corrupted keygenme with @angrdothorse, using @r2gui for the analysis. Cutter and angr are incredibly powerful and useful tools for solving this type of challenge
binaryresearch.github.io/2020/01/15/Ana…
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
Z0F
@0xZ0F
|
11. sij |
|
My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.
github.com/0xZ0F/Z0FCours…
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
Vera Mens
@V3rochka
|
15. sij |
|
Ghidra Script that sets the names for missing function names by looking for relevant patterns in the binary!
Hope that will help you too :)
github.com/alephsecurity/… pic.twitter.com/YmgTMhLJXR
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
Aleph Research
@alephsecurity
|
14. sij |
|
Ruckus vulnerability research by @waveburst is now online, several critical vulnerabilities found. Check it out: alephsecurity.com/2020/01/14/ruc…
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
b0bb
@0xb0bb
|
10. sij |
|
I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64. github.com/0xb0bb/pwndra pic.twitter.com/o1JPjyjgga
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
MicrosVuln
@microsvuln
|
10. sij |
|
Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics) github.com/guyinatuxedo/n…
#reverse #exploitation
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
W3Challs
@w3challs
|
2. sij |
|
Starting 2020 with a major website update @ w3challs.com and 3 new pwn challenges from @__awe & @0xGrimmlin ! Enjoy!
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
Brian Knighton
@lazybinding
|
31. pro |
|
Hey All! Here's a link to the slides for the #GHIDRA talk at #BHUSA 2019: github.com/NationalSecuri…
Enjoy. Happy New Year!
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
360 Netlab
@360Netlab
|
23. pro |
|
Our latest blog, Mozi, another botnet uses DHT protocol targeting weak telnet password and 11 different vulnerabilities blog.netlab.360.com/mozi-another-b…
|
||
|
|
||
|
julian
@_SYS_V
|
25. pro |
|
圣诞节快乐,大家!Merry Christmas everyone
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
Cutter
@r2gui
|
20. pro |
|
Cutter v1.10 now has a DEBUGGER! 🐞🥳
After a lot of work, we are so happy to announce that we finally implemented your most requested feature.
The beta version of the debugger is available NOW on our website >> cutter.re
List of features and what's coming next >> pic.twitter.com/4OOlF0Y0Wk
|
||
|
|
||
|
julian
@_SYS_V
|
15. pro |
|
对了,我应该告诉你们 - 如果你在中国, 想看我博客的内容的话,我推荐你用一个VPN,因为有的文章里的程序是 gists,好像在中国你们不能下载在 gist.github. com 的代码。我不确定为什么。
|
||
|
|
||
|
julian
@_SYS_V
|
14. pro |
|
New post out. Using @qiling_io , @capstone_engine , r2 to build CFGs binaryresearch.github.io/2019/12/11/Ana…
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
The Captain
@ArrrCaptain
|
12. pro |
|
Folks, here's why you should follow @lazybinding:
18 years (!) on #Ghidra, @BlackHatEvents speaker, amazing forward and reverse engineer, superb instructor.
Check out his #BlackHat talk: youtu.be/kx2xp7IQNSc pic.twitter.com/xhE4ieQrc1
|
||
|
|
||
| julian proslijedio/la je tweet | ||
|
Evan Walls
@fuzzwalls
|
12. pro |
|
All @devttyS0's IDA scripts have (finally) been ported to Ghidra. Woohoo! github.com/fuzzywalls/ghi…
|
||
|
|
||