Twitter | Pretraživanje | |
A Dude
148
Tweetovi
92
Pratim
3
Osobe koje vas prate
Tweetovi
A Dude proslijedio/la je tweet
Luca Marcelli 14. sij
Really can recommend diaphora when patchdiffing things, like windows updates ;)
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
CRK 16. sij
CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Samy Kamkar 5. sij
I've developed a new technique for bypassing firewalls/NATs and producing full TCP/UDP session to targeted user. Anyone have RCE for a service that's typically only run behind NATs (eg desktop software like Sonos, Spotify, Dropbox, etc which bind to *) and want to merge projects?
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
gerhart 4. sij
Update IDA PRO Hyper-V hvix64 hypercall's handlers creation script with hypercall names from hvgdk.h
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Matt Stark 3. sij
The effect can now handle collisions and multiple photos
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Ulf Frisk 4. sij
same UEFI DMA attack I demoed at 34c3 still work 2 years later on my brand new high-end laptop with most recent UEFI 😥
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Danny Odler 31. pro
Check out my writing on HyperV internals (Hebrew). Special thanks to for advising on the topic.
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Peter Bosch 31. pro
Slightly late, but here's the slides to my talk: . Contains some useful bonus slides and links, somewhere in the next few days I will add more references to prior work on this subject.
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Carl Schou / vm 30. pro
I wonder if vs project arbitrary code execution is another wont-fix🤔
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Binni Shah 28. pro
Amlogic S905 SoC : bypassing the (not so) Secure Boot to dump the BootROM :
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Trammell Hudson ⚙ 3. ruj
Does AMD have something similar to the IFD for configuring flash speed and read commands? The PSP boots fine from the spispy emulator with normal 0x03 reads at 20MHz SCLK, although the x86 switches to fast 0x0B reads in PeiCore and reboots soon afterwards.
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Ori Damari 9. pro
I wrote a guide for beginners about windows library code:) In this guide I describe how the compilation and linkage model works in windows at the assembly level - static and dynamic libraries, etc. Have fun 🙃
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Phoronix 12. pro
Publishes Vega 7nm ISA Documentation - 300 More Pages Of GPU Docs
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
JEB Decompiler 31. lis
Reverse-engineering malware? Here: Tutorial on Go binaries internals + Analysis scripts for JEB Decompiler + Use-case on StealthWorker => A great treat by ! Links: and
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Mobile Security 5. stu
Android Frida hooking: disabling FLAG_SECURE by and
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Mobile Security 6. stu
PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation [PAPER] by
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
@mikko 25. lis
Impressive: Someone wrote a compiler which compiles cheats (for Counterstrike) to use Return-oriented programming, only executing code that is already present in the machine's memory. This is done to try to bypass anticheat engines. Seen at
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
FireF0X 23. lis
Windows 10 (RS1-19H2+) UAC bypass using EditionUpgradeManager undocumented autoelevated COM interface. Works together with environment variables spoofing,
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Carl Schou / vm 19. lis
First part of my kernel hacking mini-series: "Hooking the graphics kernel subsystem"
Reply Retweet Označi sa "sviđa mi se"
A Dude proslijedio/la je tweet
Philip Tsukerman 18. lis
Finally got around to writing a bit about some prior work, so here's some COM, SxS, random Windows stuff, unstable persistence/abuse opportunities, and me manually discovering things I should have read in documentation
Reply Retweet Označi sa "sviđa mi se"