Twitter | Search | |
Search Refresh
SQALogic 3h
Just like the bad guys ... To counter attacks, teams need to know their tools and how they work. rounds up the top tools.
Reply Retweet Like
OccupytheWeb Jul 15
Reverse Engineering Malware, Part 1: Getting Started Reversing
Reply Retweet Like
Swavek 19h
Replying to @Deepneuron
He addresses one of the options that at least some encounters are of military USAP nature, engaging & tracking alleged real contactees for purpose of to extract intel and/or tech. Really f*cked up, but probably explains some that we find in the mixed bag.
Reply Retweet Like
Brian Fabiano 4h
Hi folks, I am now recruiting in MD, VA, FL, TX and other locations. My org is called CODEX (Cyber Offensive & Defensive Experts); Yea, I know, pretty darn cool. CODEX domain space:
Reply Retweet Like
High Spec Composites Jul 18
Today our 3D Scanning department are enjoying a airbox for a new client’s project. Capturing over 40,000,000 data points, our team can now repair or replace the component, restoring 25yr old engineering using modern technologies.
Reply Retweet Like
UFO Insight Jul 21
Twentieth Century Patented Tech The Result Of The Crash?
Reply Retweet Like
Arpit Jul 20
Thank you for providing me an opportunity to speak in the Null Meet. Looking forward to more such sessions in the future. Access the slides in the below link.
Reply Retweet Like
Andrey K Jul 14
What is your inspiration? What are you good at? ❤️
Reply Retweet Like
freak_out Jul 18
"Radare2 - how to easily get started (Basics #1: Reverse Engineering Framework)"
Reply Retweet Like
JULIUS SOLOMON Jul 18
Replying to @zolodeveloper
Who is in for this challenge ❓
Reply Retweet Like
NetSec Focus Jul 19
Time for Chapter Two in & from - now we've got control of the EIP let's get make it dance to our tune
Reply Retweet Like
Sevuhl Jul 14
Going to start a video series both to learn and to teach others. All videos will be posted to Youtube free for viewing, but don't know which one to do...So was wondering if you all could help me out!
Reply Retweet Like
HOPEWELL 6h
Download FREE WHITE PAPER for insights how smart uses digitization and reverse engineering to cut cost and lead times.
Reply Retweet Like
Damien Maguire Jul 19
Reply Retweet Like
Peerlyst Jul 14
Part 5 of How to start Reverse Engineering on Application.
Reply Retweet Like
NULLCON 18h
Learn from & of ⤵️ ☑️ Reconnaissance to understand the target. ☑️ How to analyze crashes to understand the vulnerability root cause. 🎟️Register ⤵️
Reply Retweet Like
Rachel Wendte Jul 16
I’ve lived my life as an A- student and you’re allowed to be proud 🎉. Chris Morocco gets an A+ in , one of my favorite new series from .
Reply Retweet Like
Manufacturing News Jul 21
Reply Retweet Like
Cevicas Group Inter. Jul 18
Reply Retweet Like
Hack Manhattan Jul 17
MITM attack on a GameCube controller 🎮 Teensy USB HID implementation forthcoming!
Reply Retweet Like