|
StrikeBhack
@
StrikeBhack
|
|
Interested in low-level stuff, OS and binary internals, reverse engineering, malware analysis, etc.
|
|
|
176
Tweetovi
|
373
Pratim
|
51
Osobe koje vas prate
|
| Tweetovi |
| StrikeBhack proslijedio/la je tweet | ||
|
Direction générale de l'armement
@DGA
|
28. sij |
|
#FIC2020 Le prix du défi #cyber «Deceptive Security» organisé par la DGA avec @ComcyberFR & @Agence_ID est remis à la #PME @Amossys pour sa solution innovante, à découvrir sur notre stand, qui sera expérimentée par les #armées
Félicitations au vainqueur et à @SesameIt arrivé 2e! pic.twitter.com/HUfRCkXrn3
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Tamas K Lengyel
@tklengyel
|
2. velj |
|
Do you have an open-source cybersecurity project you would like to see being worked on as part of Google Summer of Code? We @ProjectHoneynet are collecting ideas & projects for this summer! Submit yours here (even if you wouldn't be able to be a mentor): forms.gle/HiZwuf6sdThu6N…!
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Daniel Maslowski
@OrangeCMS
|
1. velj |
|
I am quite exhausted from the sheer complexity of the #firmware research I have been doing, having just spoken about the @intel ME at @fosdem. Now it's your turn: Please look into it as well and post your follow-up insights! ✨👩🏻💻
Slides: metaspora.org/look-at-me-fos…
Video will follow. pic.twitter.com/U75LfQZqXt
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
FireF0X
@hFireF0X
|
2. velj |
|
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
|
mark risher
@mrisher
|
30. sij |
|
Google loves security keys, and today announced an open source implementation to help spur further innovation from the security research community 1/ security.googleblog.com/2020/01/say-he….
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
ANSSI
@ANSSI_FR
|
24. sij |
|
L’obtention de privilèges élevés sur l’#AD #Microsoft peut entrainer la prise de contrôle complète d'un #SI
Le service Active Directory Security (ADS) de l'ANSSI accompagne la sécurisation des annuaires AD des acteurs critiques (OIV, OSE & administrations) ssi.gouv.fr/actualite/le-s…
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Caleb Fenton
@caleb_fenton
|
25. sij |
|
I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm (github.com/CalebFenton/si…) for execution.
Here's a quick video of me stepping through two similar methods. #AndroidSecurity #ReverseEngineering pic.twitter.com/72Ic5PB8MK
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Zuk
@ihackbanme
|
23. sij |
|
Extremely thrilled to launch FreeTheSandbox.org today. Thanks for everyone supporting this initiative. Together we will #FreeTheSandbox 👊
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
CERT-FR
@CERT_FR
|
24. sij |
|
CERTFR-2020-AVI-056 : Multiples vulnérabilités dans le noyau Linux de Red Hat (24 janvier 2020) cert.ssi.gouv.fr/avis/CERTFR-20…
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Stuart Winter-Tear
@StegoPax
|
23. sij |
|
Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:
github.com/Microsoft/Appl…
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
AMOSSYS Labs
@Amossys_labs
|
23. sij |
|
[BLOG] Focus on the architecture of the Linux random number generator, also known as /dev/urandom. How does it work? Is it secure? All those questions and more are answered in our blog post : read it ! blog.amossys.fr/linux-csprng-a… pic.twitter.com/iMAHK34GHs
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Mark Ermolov
@_markel___
|
22. sij |
|
We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (intel.com/content/www/us…). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Yarden Shafir
@yarden_shafir
|
16. sij |
|
After a lot of work and some crypto-related delays, I couldn't be more proud to publish @aionescu's and mine latest research - The complete overview of CET internals on Windows (so far!):
windows-internals.com/cet-on-windows/
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Dmitry Vostokov
@DumpAnalysis
|
18. sij |
|
"Accelerated Windows Debugging 3, Second Edition" book is now available on Leanpub leanpub.com/windowsdebuggi… #debugging #patterns
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Tamas K Lengyel
@tklengyel
|
16. sij |
|
Very much looking forward to this talk: "Hypervisor-level malware monitoring and extraction system - current state and further challenges" with DRAKVUF @1ns0mn1h4ck! insomnihack.ch/conference-202…
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Tal Be'ery
@TalBeerySec
|
15. sij |
|
Just published a blog explaining the root cause of the recent #win10 crypto vulnerability (CVE-2020-0601 / #curveball ?) using some "Load Bearing Analogies" to make it more accessible.
CC: @tqbf @grittygrease @dakami
medium.com/zengo/win10-cr…
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
CERT-FR
@CERT_FR
|
14. sij |
|
⚠️Alerte CERT-FR⚠️
CERTFR-2020-ALE-004 : Vulnérabilité d’usurpation d’identité dans Windows CryptoAPI (14 janvier 2020)
cert.ssi.gouv.fr/alerte/CERTFR-…
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
CERT-FR
@CERT_FR
|
14. sij |
|
⚠️Alerte CERT-FR⚠️
CERTFR-2020-ALE-005 : Multiples vulnérabilités dans le serveur de passerelle RDP de Windows (14 janvier 2020)
cert.ssi.gouv.fr/alerte/CERTFR-…
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Josh Stark
@0xstark
|
14. sij |
|
👋 hey twitter!
Meet Shawki Sukkar (@ShawkiSukkar), a 16yo self-taught developer from Aleppo, Syria
I want you to help him find a job or internship in Canada, so he can move here and continue his career and education in a safe environment
twitter.com/ShawkiSukkar/s…
|
||
|
|
||
| StrikeBhack proslijedio/la je tweet | ||
|
Vasilenko Egor
@yeggorv
|
14. sij |
|
UEFI_RETool with IDA plugin now only work on python3: github.com/yeggor/UEFI_RE…
|
||
|
|
||