| Tweetovi |
| A Dude proslijedio/la je tweet | ||
|
Luca Marcelli
@layle_ctf
|
14. sij |
|
Really can recommend diaphora when patchdiffing things, like windows updates ;) pic.twitter.com/3tpl3B6oZu
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
CRK
@ch3tanK
|
16. sij |
|
CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC github.com/ollypwn/cve-20… pic.twitter.com/QKIaWrRQFL
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Samy Kamkar
@samykamkar
|
5. sij |
|
I've developed a new technique for bypassing firewalls/NATs and producing full TCP/UDP session to targeted user. Anyone have RCE for a service that's typically only run behind NATs (eg desktop software like Sonos, Spotify, Dropbox, etc which bind to *) and want to merge projects?
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
gerhart
@gerhart_x
|
4. sij |
|
Update IDA PRO Hyper-V hvix64 hypercall's handlers creation script with hypercall names from hvgdk.h
github.com/gerhart01/Hype… twitter.com/aionescu/statu…
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Matt Stark
@mattstark256
|
3. sij |
|
The effect can now handle collisions and multiple photos #madewithunity #gamedev #vfx #polaroid pic.twitter.com/NXKt8KGIcZ
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Ulf Frisk
@UlfFrisk
|
4. sij |
|
same UEFI DMA attack I demoed at 34c3 still work 2 years later on my brand new high-end laptop with most recent UEFI 😥 pic.twitter.com/JHHHT2n8hx
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Danny Odler
@DannyOdler
|
31. pro |
|
Check out my writing on HyperV internals (Hebrew). Special thanks to @AmarSaar for advising on the topic.
digitalwhisper.co.il/files/Zines/0x…
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Peter Bosch
@peterbjornx
|
31. pro |
|
Slightly late, but here's the slides to my #36C3 talk: pbx.sh/intelme_talk.p… . Contains some useful bonus slides and links, somewhere in the next few days I will add more references to prior work on this subject.
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Carl Schou / vm
@vm_call
|
30. pro |
|
I wonder if vs project arbitrary code execution is another wont-fix🤔 pic.twitter.com/bN4BKgfVUQ
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Binni Shah
@binitamshah
|
28. pro |
|
Amlogic S905 SoC : bypassing the (not so) Secure Boot to dump the BootROM : fredericb.info/2016/10/amlogi… pic.twitter.com/aeUl56jTEP
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Trammell Hudson ⚙
@qrs
|
3. ruj |
|
Does AMD have something similar to the IFD for configuring flash speed and read commands? The PSP boots fine from the spispy emulator with normal 0x03 reads at 20MHz SCLK, although the x86 switches to fast 0x0B reads in PeiCore and reboots soon afterwards. pic.twitter.com/eYBTgFwuB4
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Ori Damari
@0xrepnz
|
9. pro |
|
I wrote a guide for beginners about windows library code:)
In this guide I describe how the compilation and linkage model works in windows at the assembly level - static and dynamic libraries, etc.
Have fun 🙃
repnz.github.io/posts/reversin… pic.twitter.com/fXthghpE4k
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Phoronix
@phoronix
|
12. pro |
|
#AMD Publishes @Radeon Vega 7nm ISA Documentation - 300 More Pages Of GPU Docs
phoronix.com/scan.php?page=… pic.twitter.com/1yAvC4Eena
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
JEB Decompiler
@jebdec
|
31. lis |
|
Reverse-engineering #Golang malware? Here: Tutorial on Go binaries internals + Analysis scripts for JEB Decompiler + Use-case on StealthWorker => A great #Halloween treat by @joancalvet! Links: pnfsoftware.com/blog/analyzing… and github.com/pnfsoftware/je… #ReverseEngineering pic.twitter.com/rVLAf1ZQCM
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
5. stu |
|
Android Frida hooking: disabling FLAG_SECURE
#MobileSecurity #AndroidSecurity by @_bhamza and @securifybv
securify.nl/nl/blog/SFY201…
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
6. stu |
|
PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
#MobileSecurity #AndroidSecurity [PAPER] by @moarbugs
people.eecs.berkeley.edu/~rohanpadhye/f… pic.twitter.com/ic04tnWQbH
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
@mikko
@mikko
|
25. lis |
|
Impressive: Someone wrote a compiler which compiles cheats (for Counterstrike) to use Return-oriented programming, only executing code that is already present in the machine's memory. This is done to try to bypass anticheat engines. Seen at #t2infosec github.com/Speedi13/ROP-C… pic.twitter.com/CNZeRA9STz
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
FireF0X
@hFireF0X
|
23. lis |
|
Windows 10 (RS1-19H2+) UAC bypass using EditionUpgradeManager undocumented autoelevated COM interface. Works together with environment variables spoofing, gist.github.com/hfiref0x/de9c8…
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Carl Schou / vm
@vm_call
|
19. lis |
|
First part of my kernel hacking mini-series: "Hooking the graphics kernel subsystem" vmcall.blog/nt/2019/10/18/…
|
||
|
|
||
| A Dude proslijedio/la je tweet | ||
|
Philip Tsukerman
@PhilipTsukerman
|
18. lis |
|
Finally got around to writing a bit about some prior work, so here's some COM, SxS, random Windows stuff, unstable persistence/abuse opportunities, and me manually discovering things I should have read in documentation
medium.com/@philiptsukerm…
|
||
|
|
||