Twitter | Pretraživanje | |
Pretraživanje Osvježi
Shogun Lab 22. pro
The second part of my Ghidra tutorial series for reversing Windows binaries is up! We look at converting data, function call trees/graphs and the script manager. Along the way, we'll solve CrackMe binaries and a Flare-On 6 CTF challenge:
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 4 h
Pay attention when a malware is using Mailslots (similar to named pipes) for local communication on Windows: Mailslot Server (App. Client): CreateMailslot( ) + ReadFile( ) Mailslot Client (App. Server): CreateFile( ) + WriteFile( )
Reply Retweet Označi sa "sviđa mi se"
Mayur Parmar 3 h
Secured 17th position in CTF organized by OWASP seasides. Team:Eagles (Vraj raval , Tarang Parmar , ) Thanks
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 23 h
Few malware authors have been using thread's ownership changing to try to make analysis harder: void function2(std::thread x); .... std::thread function3(function1( )); function2(std::move(function3( ));
Reply Retweet Označi sa "sviđa mi se"
Blackstorm Security 4. velj
EmoCheck: Emotet detection tool for Windows OS --
Reply Retweet Označi sa "sviđa mi se"
Blackstorm Security 4. velj
Reply Retweet Označi sa "sviđa mi se"
𝘚𝘢𝘭𝘷𝘢𝘵𝘰𝘳𝘦 𝘊𝘢𝘮𝘱𝘰𝘭𝘰 ֎ 4. velj
Reply Retweet Označi sa "sviđa mi se"
Blackstorm Security 4. velj
BayWorld event, Cyber Attack Against Foreign Trade Industry:
Reply Retweet Označi sa "sviđa mi se"
Lobsters 2. velj
Reply Retweet Označi sa "sviđa mi se"
CampusCiberseguridad 2. velj
Reply Retweet Označi sa "sviđa mi se"
Blackstorm Security 1. velj
Reply Retweet Označi sa "sviđa mi se"
Paweł Łukasik 1. velj
My solution for MugatuWare from Flare-On 2019 is out 📺 👉 With a special thank you to
Reply Retweet Označi sa "sviđa mi se"
CampusCiberseguridad 1. velj
¿Conoces nuestra nueva formación? ¡Descúbrela! - Máster en Reversing, Análisis de Malware y Bug Hunting - Máster Profesional en Seguridad Ofensiva (OSCP)
Reply Retweet Označi sa "sviđa mi se"
Paweł Łukasik 31. sij
I like the time for my video about Mugatu :) Publishing tomorrow \o/
Reply Retweet Označi sa "sviđa mi se"
Niemand 🇦🇷 31. sij
Reversing XignCode3 Anticheat – Registering Notify and Callback Routines Part 4.1 is out! 🤯 Anti-cheats use callbacks and notification routines to control what is happening on your system, let's dig into this
Reply Retweet Označi sa "sviđa mi se"
Blackstorm Security 31. sij
Detection Engineering using Apple’s Endpoint Security Framework:
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 31. sij
(interesting write-up) Introduction to SpiderMonkey exploitation:
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 30. sij
Obfuscapk: A black-box obfuscation tool for Android apps
Reply Retweet Označi sa "sviđa mi se"
Evgeny Belenky 29. sij
Need to take apart from PE files? Here's a list of tools to help you do that
Reply Retweet Označi sa "sviđa mi se"
aide auto Tweets 29. sij
2020 is the Year Of The Back Stop! BackStop & is a modern hi tech reversing aide for commercial rigid trucks & trailers.BackStop system is an attractive product for transport managers to improve health & safety standards info@aideautomotive.com
Reply Retweet Označi sa "sviđa mi se"