Twitter | Pretraživanje | |
Phenol
Former chemistry student. Now studying at . Doing reverse-engineering and binary exploitation for fun.
201
Tweetovi
279
Pratim
670
Osobe koje vas prate
Tweetovi
Phenol proslijedio/la je tweet
Éric D. 15. sij
Que Mozilla soit en si mauvaise posture qu'ils doivent se séparer d'une partie de ses salariés est la mauvaise nouvelle du mois pour le Web. Je ne sais pas si tout le monde mesure l'imperieuse nécessité de ce projet indépendant.
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
quarkslab 16. sij
[BLOG] Reverse Engineering a Philips TriMedia CPU based IP Camera - Part 3 by :
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
Synacktiv 14. sij
Fifty shades darker: no safe wor(l)d in SMM by
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
KEENLAB 2. sij
Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
C0de3 31. pro
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4)
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
Anestis Bechtsoudis 29. pro
Pixel 3,4 devices use a custom packed img format for bootloader & radio (FBPK) that is not part of upstream EDK2 bootloader. Spent part of holidays reversing G's B1c1FastbootApp UEFI app & released an upacking tool as a side-product -
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
HackSmith 29. pro
The Secret Life of SIM Cards Writing, building, loading, and using code on SIM Cards [PDF]
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
Panda 27. pro
If you're interested in Samsung's TrustZone, the talk I gave at is online. It presents the work we did with and at . We are at if you want to come say hi. :)
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
quarkslab 17. pro
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 2) by ,   and
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
chaignc 17. pro
Two days left if you want to be qualified for the Finals to win not one, not two but THREE . 4 Teams are already qualified execve+auditd= <3
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
quarkslab 10. pro
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 1) by , and
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
Sinaei 9. pro
I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
Bjoern Kerler 30. stu
As promised, here is Part 2 of my Qualcomm QDSPv6 Hexagon Reversing Blog : .Yes, it does include useful stuff such as a hexagon disassembler based on python 3 and a comparison of common plugin/tools for qc hexagon disassembly. Let the patching begin :)
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
Bjoern Kerler 15. stu
Dear twitter 🤓 followers, let's start xmas early. I officially announce the start of my bigger blog series on reversing/exploiting Qualcomm QDSPv6 modem and TZ. Part 1 over here : . Parts 2 - 4 will follow the next four weeks. Enjoy !
Reply Retweet Označi sa "sviđa mi se"
Phenol 7. stu
Odgovor korisniku/ci @m4khno_
Y'a pas eu beaucoup de reverse a faire, puis c'est greg et charles de Armature qui on solve les challs, je leur ai juste donne un petit coup de main sur une partie :)
Reply Retweet Označi sa "sviđa mi se"
Phenol 7. stu
Odgovor korisniku/ci @ArmatureTech @_leHACK_
GG à Greg! Merci pour le WU !
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
ARMATURE Technologies 7. stu
Bravo à Greg Taube pour le write-up du Black Badge et à pour son aide !
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
Grant Hernandez 7. stu
How complicated is cellular baseband firmware? At least this complicated: over 150K debugging messages across 932 directories and 2,775 files! Rebuilding the source code skeleton from Samsung S10's Shannon S5000 baseband debugging messages.
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
Alexander Popov 2. stu
I just did the full disclosure of the exploitable bugs in the 'vivid' driver of the Linux kernel:
Reply Retweet Označi sa "sviđa mi se"
Phenol proslijedio/la je tweet
Trail of Bits 31. lis
Destroying x86_64 instruction decoders with differential fuzzing
Reply Retweet Označi sa "sviđa mi se"