|
Laughing Bit
@
laughing_bit
Paris, France
|
|
Born to code, live to hack. Fond of InfoSec, low level software and mirabelles. Author of @chrysalide_ref, member of @ZenkSecurity. Tweets are my tweets.
|
|
|
423
Tweetovi
|
204
Pratim
|
717
Osobe koje vas prate
|
| Tweetovi |
| Laughing Bit proslijedio/la je tweet | ||
|
Siguza
@s1guza
|
7. sij |
|
New blog post. ARM hardware bug. In the specification.
siguza.github.io/PAN/
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Bill Gates
@BillGates
|
9. pro |
|
I'm a big fan of @SiliconHBO and was excited when they asked me to appear in the series finale tonight. #AlwaysBlue pic.twitter.com/kDnM81w8IF
|
||
|
|
||
|
Laughing Bit
@laughing_bit
|
30. stu |
|
Some headers seem missing in the rendering of z80dbg.cpp content.
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Maddie Stone
@maddiestone
|
21. stu |
|
Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.
googleprojectzero.blogspot.com/2019/11/bad-bi…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
20. stu |
|
KNOX Kernel Mitigation Bypasses - New Reliable Android Kernel Root Exploitation Part #2
#MobileSecurity #AndroidSecurity
#POC2019 [SLIDES]
powerofcommunity.net/poc2019/x82.pdf pic.twitter.com/mLnykwWM6b
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Michal Stanek @ 36c3
@3lbios
|
19. stu |
|
Watch out for typos in your switch/case blocks, this actually compiles (lol). In this case it lets you overflow a kernel buffer with arbitrary data. From Dragon CTF 2019. pic.twitter.com/H8mk50HBJS
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
F-Secure Labs
@FSecureLabs
|
1. stu |
|
Want to win Pwn2Own without all the hassle of having to spend time finding bugs? We finally got round to sorting out and releasing Jandroid - a tool for helping to find logic bugs in Android apps (and just in time for next week!) labs.f-secure.com/blog/automatin…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Specter
@SpecterDev
|
9. stu |
|
I've published a write-up on the Android Binder use-after-free kernel bug that p0 discovered recently affected the Pixel 2 and Galaxy S7/S8/S9. It goes into technical details of how an arbitrary read/write is established :)
dayzerosec.com/posts/analyzin…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Ori Damari
@0xrepnz
|
26. lis |
|
While reverse engineering a rootkit sample (That I soon will publish about 😉) I saw this weird compiler optimization.
I thought I'll start documenting compiler optimizations for reverse engineers. Read my first article in the series:
repnz.github.io/posts/reversin… pic.twitter.com/RufA3fHDa4
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
dukeBarman
@dukebarman
|
24. lis |
|
Our team represented by @a1exdandy published technical analysis of the checkm8 exploit habr.com/en/company/dse…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Steve Miller
@stvemillertime
|
17. lis |
|
Please to announce Definitive Dossier of Devilish Debug Details – Part Deux of our PDB path research, where @secbern covers his journey into statistical analysis and approaches for general classification of PDB paths with respect to malware. #dailypdb
fireeye.com/blog/threat-re…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Grant Hernandez
@Digital_Cold
|
15. lis |
|
The writeup and release is here!
Tailoring CVE-2015-2215 to Achieve Root - hernan.de/blog/2019/10/1…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
ExaTrack
@ExaTrack
|
14. lis |
|
From tweet to rootkit, our analysis by @Heurs of a signed #Winnti rootkit highlighted by @cyb3rops :
[EN] exatrack.com/public/winnti_…
[FR] exatrack.com/public/winnti_…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Kostya Kortchinsky
@crypt0ad
|
2. lis |
|
How a double-free bug in WhatsApp turns to RCE -- awakened1712.github.io/hacking/hackin…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Gamepopper
@gamepopper
|
4. lis |
|
(a>>1)+(b>>1)+(a&b&1)
This operation, that works out the average of two ints in a single instruction, was patented by Samsung. That patent expires today.
patents.google.com/patent/US60072…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Tetrane
@tetrane
|
17. ruj |
|
REVEN 2.2 is out!
Python API, Automatic Recording, RE Automation and more...
Details on blog.tetrane.com/2019/REVEN-New…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Jens Gustedt
@gustedt
|
18. ruj |
|
The second edition of Modern C is now available modernc.gforge.inria.fr #ModernC
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
RPISEC
@RPISEC
|
5. ruj |
|
TokyoWesterns CTF 2019- gnote writeup by pernicious
rpis.ec/blog/tokyowest…
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Ian Beer
@i41nbeer
|
30. kol |
|
googleprojectzero.blogspot.com/2019/08/a-very… thanks to @_clem1, @5aelo for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
|
||
|
|
||
| Laughing Bit proslijedio/la je tweet | ||
|
Gynvael Coldwind
@gynvael
|
10. kol |
|
Paged Out! #1 is out! (and it's free to download!)
pagedout.institute/?page=issues.p…
There are 57 articles in 12 categories:
Electronics
Programming
Assembly
Reverse Engineering
Sec/Hack
Retro
File Formats
Algorithmics
SysAdmin
Radio
Phreaking
OS Internals
Enjoy! #PagedOut!
|
||
|
|
||