Twitter | Pretraživanje | |
Paul Makowski
CTO & Tweets are mine. Unless they're good, then they're probably someone else's.
2.320
Tweetovi
681
Pratim
788
Osobe koje vas prate
Tweetovi
Paul Makowski proslijedio/la je tweet
vx-underground 4. velj
Friends, has been incredibly generous and have offered to aid us in our malware packaging. Moving forward, we will be introducing changes to our malware set to conform with their naming conventions. Thank you from the bottom of my heart, Polyswarm. I am in your debt.
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Alex Stamos 1. velj
Odgovor korisniku/ci @alexstamos
One of the better ideas I have heard of how social media companies can deal with state organs is to ban accounts tied to governments that don't allow free access to said social media site. If normal Chinese citizens can't post to Twitter/FB, the CCP shouldn't either.
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
0verfl0w 2. ruj
Want to learn but don't know where to begin? Check out my online course designed for beginners starting off in @ ! We cover everything from Assembly and Banking Trojans to Word Macros and Unpacking! 🔒
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Lynn 28. stu 2017.
things you hoped weren’t technically Turing-complete, but they are: MPEG-4 audio
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Kostya Serebryany 30. sij
HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski 28. sij
Odgovor korisniku/ci @vxunderground @PolySwarm
Hey there, perhaps () can help! I'll slide into your DMs
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Dino A. Dai Zovi 26. sij
The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Caleb Fenton 25. sij
I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
The Captain 23. sij
Guys I’m really excited to announce that Bryan and I are teaching courses open to the public! Tickets are live as I tweet. We’ll be adding more advanced Ghidra and classes in the near future. Find me at and chat me up!
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Alex Stamos 22. sij
This FTI forensics report is not very strong. Lots of odd circumstantial evidence, for sure, but no smoking gun. The funny thing is that it looks like FTI potentially has the murder weapon sitting right there, they just haven't figured out how to test it.
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
The Captain 22. sij
RUMINT: Ghidra debugger module is in alpha testing; should work out of the box with gdb 8.0.1; more configuration required for Windows
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Artur Janc 22. sij
Earlier today we published the details of a set of vulnerabilities in Safari's Intelligent Tracking Prevention privacy mechanism: . They are... interesting. [1/9]
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
SwiftOnSecurity 22. sij
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Matthew Garrett 20. sij
Do you want uncoordinated disclosure? Because if your bug bounty program bans publication, you're setting a price on people's willingness to stay quiet. If they disagree with that price or that principle and you don't have an alternative path, you'll get uncoordinated disclosure.
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Pwn All The Things 19. sij
Three things in life are constant: death, taxes, and exploitable memory-corruption vulnerabilities in any C/C++ codebase longer than a couple thousand lines long
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Gen Michael Hayden 16. sij
Strong device encryption protects all Americans from cyber threats—new vulnerabilities, like the backdoor sought by the FBI, undermines everyone’s security. Weakening encryption won’t stop criminals and terrorists, as I wrote in last month. ()
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Brock Wilbur 17. sij
Short Thread: staying with some friends and last night after everyone went to bed I could not figure out how to turn off the large ceiling light in their living room. There is a wall controller that seemed fairly straightforward.
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Patch Friday 17. sij
Vulnerability severity levels
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski proslijedio/la je tweet
Saleem Rashid 17. sij
Odgovor korisniku/ci @CiPHPerCoder
Reply Retweet Označi sa "sviđa mi se"
Paul Makowski 16. sij
Odgovor korisniku/ci @axi0mX
+1 for Let's Decrypt
Reply Retweet Označi sa "sviđa mi se"