Twitter | Pretraživanje | |
Minh-Triet Pham Tran
APT Hunting, Threat Hunting, Incident Response, Forensics Analysis, Red Team/Internal System Penetration Testing as a Service
1.600
Tweetovi
5.001
Pratim
2.201
Osobe koje vas prate
Tweetovi
Minh-Triet Pham Tran proslijedio/la je tweet
Richard Feynman 11. sij
1. Never stop learning. 2. See failure as a beginning. 3. Teach others what you know. 4. Assume nothing, question everything. 5. Analyze objectively. 6. Practice humility. 7. Respect constructive criticism. 8. Love what you do. 9. Give credit where it's due. 10. Take initiative.
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
David Oswald 20. sij
Happy to announce that you now can find the lecture notes for my Hardware and Embedded Systems Security course online, including tex sources:
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Samy Kamkar 5. sij
I've developed a new technique for bypassing firewalls/NATs and producing full TCP/UDP session to targeted user. Anyone have RCE for a service that's typically only run behind NATs (eg desktop software like Sonos, Spotify, Dropbox, etc which bind to *) and want to merge projects?
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Lukas Stefanko 7. stu
Great news Android folks! + + were selected to join forces with Google Play Store to scan apps for malicious behaviour. It is a great way to harden security of Google Play
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Lenny Zeltser 20. sij
So glad to hear that attendees found my writing presentation useful! For those who couldn’t be there, here’s the rating sheet for the Right Information: Threat Reports that I shared:
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran 20. sij
Odgovor korisniku/ci @Xylit0l
It's on my plan, the .ini files are good to share too :) .
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran 20. sij
Odgovor korisniku/ci @Xylit0l
Hey, feel free to contribute to my collections of OllyDbg modifications: .
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Cerbero Suite 15. sij
Version 3.5 is out with the Ghidra decompiler integrated in Carbon (no Ghidra or Java installation necessary). The decompiler features navigation, comments and renaming of functions, labels and variables. Happy hacking!
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran 18. sij
I am so sad that there's still no one from Facebook messaging me or answering messages from me/the victim yet. Only one Facebook security employee answered me but told me that it's out of scope for him.
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran 18. sij
Odgovor korisniku/ci @fbsecurity @sherylsandberg i 4 ostali
I am so sad that there's still no one from Facebook messaging me or answering messages from me/the victim yet. Only one Facebook security employee answered me but told me that it's out of scope for him.
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran 18. sij
Odgovor korisniku/ci @badsynthesis @hasherezade i 2 ostali
There's still no one contact me or the victim yet.
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Kenn White 15. sij
Some initial impressions on CVE-2020-0601
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
HD Moore 6. pro
Excited about weird protocol tricks and device fingerprinting? The video from my Duo Security Tech Talk - Modern Network Discovery is now online at Slides: Thanks again to for hosting!
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Xylitol 13. sij
redrawing my 'ollydbg modifications' vt graph be like
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Mr Andy goTtA gO fASt offensive 27. pro
While I've started work on a second book, I've also decided to drop the minimum cost of my book to free feel free to share with those who are looking at starting out in pentesting or bug hunting, I've been told it's a pretty good read! RT please
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Paul Graham 10. sij
What has your work taught you that other people don't realize?
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Joxean Koret 8. sij
I have just published an IDA Python script mixing 's CodeCut and IDAMagicStrings. It's available here:
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Karsten Hahn 27. pro
Odgovor korisniku/ci @gynvael
I would ask them: When you analysed/reversed samples, what was the most exciting thing? What the most difficult thing you solved that you are proud of? Is there anything that could have helped you to achieve that easier?
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Karsten Hahn 27. pro
Odgovor korisniku/ci @gynvael
If someone is interested in infosec and starts reversing/analysing, they will stumble over problems and questions, e.g., missing tools, missing info ... This is what they should use for their thesis. If you dictate a topic, it won't be their heart's interest.
Reply Retweet Označi sa "sviđa mi se"
Minh-Triet Pham Tran proslijedio/la je tweet
Frank Boldewin 28. pro
IDA Pro 7.x plugin that integrates decompiler code by Chris Eagle ( ) Awesome!
Reply Retweet Označi sa "sviđa mi se"