Twitter | Pretraživanje | |
Javier Yuste
Malware
27
Tweetovi
183
Pratim
8
Osobe koje vas prate
Tweetovi
Javier Yuste proslijedio/la je tweet
Joshua Saxe 28. sij
1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
LAB52 17. sij
This weekend we have to re-read these posts about Russian Cyber Intelligence Community from ...and also we have to hang this picture. Don't ask us why...
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
Arvind Narayanan 4. sij
People giving career advice should specify the sample that it's based on. Human nature is to overgeneralize from personal experience, so most advice should be considered suspect for being based on a sample size of 1. That's why there's so much conflicting advice on any topic.
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
Ben Buchanan 3. sij
My thanks to ⁦⁩ for his kind coverage of my upcoming book, The Hacker and the State. It’s exciting to release the book at a moment when cyber operations seem more poised than ever to shape international affairs—for better or for worse.
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
Evan Walls 12. pro
All 's IDA scripts have (finally) been ported to Ghidra. Woohoo!
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
Rolf Rolles 28. stu
Somehow I missed there's a whole Ph.D. thesis on symbolic abstraction: Looks pretty readable, too.
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
MalwareTech 8. stu
When the news broke about BlueKeep exploitation in the wild, most of the reactions were basically "it's not a worm, so it doesn't matter". I decided I'd do a thread on why that's wrong, and why a worm isn't even a worst case scenario. THREAD:
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
mich 4. stu
Is there interest for something like Lumina for Ghidra? A script that sends FID hashes as queries to a server which returns a function name and signature. An additional script that allows uploading local FID hashes with associated function names and signatures.
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
mich 21. lis
Pushed the results of the 160GiB libc collection analysis project to The repo now contains Function ID hashes for almost 1M functions. 959055... so close. Anything more to add? More compiler libraries?
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste 30. ruj
Odgovor korisniku/ci @unixronin @JRoosen
Yeah, that makes sense. Thanks!
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste 30. ruj
Does adding Microsoft uris bypass something?
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
Lorenzo Cavallaro 16. kol
Evasive attacks on ML classifiers are scary but we know little about adversarial ML in the problem space: we may need to rethink the whole formalization, incl. optimization and constraints for a principled approach - come and talk to us poster session
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
paπcake🎗🌱 3. kol
I just presented my Ghidra plugin at and pressed the “publish” button in github. Enjoy!
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
CryptoInsane 31. srp
Automated Deobfuscation of Android Native Binary Code
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
NowSecure 31. srp
During the USA 2019 Mobile App Security Training we're releasing a plug-in for Ghidra that starts a r2web server and lets multiple r2 instances interact with it. Stay tuned!
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
Aleph Research 9. srp
Researching obscure architectures sounds challenging to you? We thought so too, so we developed a disassembly and analysis plugin for to make things easier! Read on to learn how we did it.
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
Cutter 28. lip
We created a list of community plugins and scripts for Cutter 😎 From malware analysis to code coverage visualizers. Check it out @ We invite you to write more plugins for Cutter following our documentation:
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste proslijedio/la je tweet
Itay Cohen🌱 24. tra
My new article has just been published! 🚀 Deobfuscating the graphs of Ocean Lotus' (APT32) malware using Cutter and radare2 Python plugins. Check it out @ |
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste 21. velj
Fixing a bug after 48 hours of pain feels so relieving
Reply Retweet Označi sa "sviđa mi se"
Javier Yuste 6. velj
Reply Retweet Označi sa "sviđa mi se"