Twitter | Pretraživanje | |
Pretraživanje Osvježi
Alexandre Cheron 38 min
Analyzing WhatsApp Calls with Wireshark, radare2 and Frida
Reply Retweet Označi sa "sviđa mi se"
Abraham Pasamar 1. velj
Usaremos herramientas como , y para adquirir y analizar artefactos forenses y .
Reply Retweet Označi sa "sviđa mi se"
☩MalwareMustDie 28. ruj
-New : MMD-0064-2019 - Linux/AirDropBot With a hands out for a new stripped in () Analyzed & written by thx:
Reply Retweet Označi sa "sviđa mi se"
Captain Banana 🌱 30. srp
Pwning for the PwnDebian challenge. Found a command injection hidden in a crafted binary. Fixed in master as of yesterday
Reply Retweet Označi sa "sviđa mi se"
Aleph Research 9. srp
Researching obscure architectures sounds challenging to you? We thought so too, so we developed a disassembly and analysis plugin for to make things easier! Read on to learn how we did it.
Reply Retweet Označi sa "sviđa mi se"
NowSecure 17. sij 2019.
Get practical tips for using the reverse engineering toolkit developed by & , mobile security researchers at NowSecure.
Reply Retweet Označi sa "sviđa mi se"
Eduardo Novella 9. sij 2019.
Reply Retweet Označi sa "sviđa mi se"
r2tips 7. sij 2019.
helps you to understand how stack frame works. r2 finds local_variables and arguments and simplify your analisys. Check out the example!
Reply Retweet Označi sa "sviđa mi se"
Swissky 20. lip 2018.
Want to analyse a shellcode ? Bash oneliner 😍 echo -n "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80" | xxd -p | xargs rasm2 -d from ,
Reply Retweet Označi sa "sviđa mi se"
Itay Cohen🌱 13. ožu 2018.
It took awhile but it's finally here – Reversing a Self-Modifying Binary with the almighty radare2! Check it out @
Reply Retweet Označi sa "sviđa mi se"
AikonCWD 3. velj 2018.
Here I am, reversing winmine.exe with and .
Reply Retweet Označi sa "sviđa mi se"
Jacob Pimental 2. velj 2018.
New article on using Let me know what you guys think!
Reply Retweet Označi sa "sviđa mi se"
Hack with GitHub 28. pro 2017.
cutter - A Qt and C++ GUI for reverse engineering framework by
Reply Retweet Označi sa "sviđa mi se"
Fedor Sakharov 20. pro 2017.
A first part of blog series on reversing contracts with
Reply Retweet Označi sa "sviđa mi se"
paπcake🎗🌱 11. stu 2017.
Today i’ll be doing a 4-5h training on for the sec community here in Japan. Thanks to and for having me! This is the FIRST little step of a bigger leap for in the sec/shells
Reply Retweet Označi sa "sviđa mi se"
Michael Helwig 9. stu 2017.
Releasing APK-Anal, a simple python script for quick apk analysis based on (), and more:
Reply Retweet Označi sa "sviđa mi se"
Itay Cohen🌱 9. lis 2017.
Let's use radare2 to reverse engineer a Gameboy ROM! Check it out @
Reply Retweet Označi sa "sviđa mi se"
LiveOverflow 🔴 26. lip 2017.
This is a great CTF writeup of "Inst Prof", including detailed commands. Perfect to learn about :
Reply Retweet Označi sa "sviđa mi se"
radare 14. lip 2017.
The most watched talk from last r2con GlibC Heap Analsysis in Linux with
Reply Retweet Označi sa "sviđa mi se"
Christopher H 13. lip 2017.
Odgovor korisniku/ci @trufae
They are being completely ridiculous. The built-in assistant practically reverses everything for you.
Reply Retweet Označi sa "sviđa mi se"