Twitter | Pretraživanje | |
StrikeBhack
Interested in low-level stuff, OS and binary internals, reverse engineering, malware analysis, etc.
176
Tweetovi
373
Pratim
51
Osobe koje vas prate
Tweetovi
StrikeBhack proslijedio/la je tweet
Direction générale de l'armement 28. sij
Le prix du défi «Deceptive Security» organisé par la DGA avec & est remis à la pour sa solution innovante, à découvrir sur notre stand, qui sera expérimentée par les Félicitations au vainqueur et à arrivé 2e!
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Tamas K Lengyel 2. velj
Do you have an open-source cybersecurity project you would like to see being worked on as part of Google Summer of Code? We are collecting ideas & projects for this summer! Submit yours here (even if you wouldn't be able to be a mentor): !
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Daniel Maslowski 1. velj
I am quite exhausted from the sheer complexity of the research I have been doing, having just spoken about the ME at . Now it's your turn: Please look into it as well and post your follow-up insights! ✨👩🏻‍💻 Slides: Video will follow.
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
FireF0X 2. velj
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
mark risher 30. sij
Google loves security keys, and today announced an open source implementation to help spur further innovation from the security research community 1/ .
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
ANSSI 24. sij
L’obtention de privilèges élevés sur l’ peut entrainer la prise de contrôle complète d'un Le service Active Directory Security (ADS) de l'ANSSI accompagne la sécurisation des annuaires AD des acteurs critiques (OIV, OSE & administrations)
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Caleb Fenton 25. sij
I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Zuk 23. sij
Extremely thrilled to launch today. Thanks for everyone supporting this initiative. Together we will 👊
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
CERT-FR 24. sij
CERTFR-2020-AVI-056 : Multiples vulnérabilités dans le noyau Linux de Red Hat (24 janvier 2020)
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Stuart Winter-Tear 23. sij
Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
AMOSSYS Labs 23. sij
[BLOG] Focus on the architecture of the Linux random number generator, also known as /dev/urandom. How does it work? Is it secure? All those questions and more are answered in our blog post : read it !
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Mark Ermolov 22. sij
We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Yarden Shafir 16. sij
After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Dmitry Vostokov 18. sij
"Accelerated Windows Debugging 3, Second Edition" book is now available on Leanpub
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Tamas K Lengyel 16. sij
Very much looking forward to this talk: "Hypervisor-level malware monitoring and extraction system - current state and further challenges" with DRAKVUF !
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Tal Be'ery 15. sij
Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
CERT-FR 14. sij
⚠️Alerte CERT-FR⚠️ CERTFR-2020-ALE-004 : Vulnérabilité d’usurpation d’identité dans Windows CryptoAPI (14 janvier 2020)
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
CERT-FR 14. sij
⚠️Alerte CERT-FR⚠️ CERTFR-2020-ALE-005 : Multiples vulnérabilités dans le serveur de passerelle RDP de Windows (14 janvier 2020)
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Josh Stark 14. sij
👋 hey twitter! Meet Shawki Sukkar (), a 16yo self-taught developer from Aleppo, Syria I want you to help him find a job or internship in Canada, so he can move here and continue his career and education in a safe environment
Reply Retweet Označi sa "sviđa mi se"
StrikeBhack proslijedio/la je tweet
Vasilenko Egor 14. sij
UEFI_RETool with IDA plugin now only work on python3:
Reply Retweet Označi sa "sviđa mi se"