7952
showing only twitter [see all]
FinSpy VM Unpacking Tutorial Part 3: Devirtualization — Möbius Strip Reverse Engineering
RT : New blog entry: FinSpy VM Unpacking Part 3 of 3: Devirtualizing FinSpy VM Programs
from twitter
19 hours ago
Twitter
RT : RT : Remote Code Execution in IDA by double clicking a string. Protocol handler abuse.…
from twitter
2 days ago
Discovering issues in HTTP/2 with Chaos Testing
Discovering Issues with HTTP/2 via Chaos Testing
from twitter
2 days ago
GitHub - blackzert/aslur
RT : Linux ASLR and GNU Libc: Address space layout computing and defense, and “stack canary” protection bypass
from twitter
2 days ago
Twitter
RT : Super cool – reliable static binary rewriting via superset disassembly. Key idea: disassemble at *every* possible o…
from twitter
2 days ago
Twitter
RT : Google Discloses Microsoft Edge Security Feature Bypass
from twitter
2 days ago
Twitter
RT : Striker : An offensive information and vulnerability scanner :
from twitter
2 days ago
Twitter
RT : gitleaks : Searches full repo history for secrets and keys (faster than trufflehog)
from twitter
2 days ago
GitHub - zricethezav/gitleaks: Searches full repo history for secrets and keys 🔑
RT : gitleaks : Searches full repo history for secrets and keys (faster than trufflehog)
from twitter
2 days ago
(429) https://twitter.com/reconbrx/status/963136543031545856
RT : My slides on Reverse Engineering Windows Defender's JavaScript Engine are now online:
from twitter
3 days ago
Bypasss User-Mode Hooks
RT : Rewriting ntdll functions to bypass simple user-mode hooks (antidebug)
windows  from twitter
4 days ago
Twitter
RT : Rewriting ntdll functions to bypass simple user-mode hooks (antidebug)
windows  from twitter
4 days ago
Twitter
RT : A fucking huge mine for pentesters. It also will help you for the OSCP and OSCE ! Thanks for the owner of this 🙏🙏🙏…
from twitter
5 days ago
Satoshi's note: AMSI Bypass With a Null Character
RT : blogged about bland new AMSI bypass fixed this week.
from twitter
5 days ago
Twitter
RT : 😳😳 whaaat!? Someone wrote a 3D Engine made of Excel formulas
from twitter
5 days ago
Twitter
RT : Stealing Data With CSS : Attack and Defense :
from twitter
5 days ago
Twitter
RT : How to Create a Compiler (Part 1/6) — Converting text into an Abstract Syntax Tree : , Part…
from twitter
6 days ago
Untitled (https://www.youtube.com/watch?v=eF9qWbuQLuw)
RT : How to Create a Compiler (Part 1/6) — Converting text into an Abstract Syntax Tree : , Part…
from twitter
6 days ago
Untitled (https://www.youtube.com/watch?v=1PAGcPJFwbE)
RT : Introduction to Memory Forensics : ,Introduction to Windows Forensics :…
from twitter
9 days ago
Twitter
RT : Introduction to Memory Forensics : ,Introduction to Windows Forensics :…
from twitter
9 days ago
Twitter
RT : 0-day vulnerability in Telegram exploited to launch multipurpose attacks :
from twitter
10 days ago
Zero-day vulnerability in Telegram - Securelist
RT : 0-day vulnerability in Telegram exploited to launch multipurpose attacks :
from twitter
10 days ago
Untitled (https://www.youtube.com/watch?v=irhcfHBkfe0)
RT : Reverse Engineering a MMORPG Bot to Find Vulnerabilities
from twitter
12 days ago
Twitter
RT : Sandboxed Mac apps can record screen any time without you knowing : cc
from twitter
12 days ago
Twitter
RT : A paper about a C compiler which produces executables containing only printable characters, and the paper itself is…
from twitter
12 days ago
Twitter
RT : Quiet for Android: TCP using near-ultrasonic sound from speakers to microphone, for Android devices:…
from twitter
12 days ago
Twitter
RT : ROPLevel6 for ARM is now available on As my previous tweet mentions, to complete this level…
from twitter
12 days ago
Twitter
RT : [VIDEO] 2018 - Reverse Engineering on 101 ( protocols) - by and (…
Android  Game  from twitter
13 days ago
Twitter
RT : Stealing passwords from su, sudo, and ssh; in-style and with minimal effort using and a 16-line aw…
FreeBSD  DTrace  from twitter
16 days ago
Crackme0x06 Dissected with Radare2 - MOVEAX.ME
RT : Crackme0x06 Dissected with Radare2: , Crackme0x05 Dissected with Radare2:…
from twitter
16 days ago
Twitter
RT : Crackme0x06 Dissected with Radare2: , Crackme0x05 Dissected with Radare2:…
from twitter
16 days ago
Dive into BPF: a list of reading material
RT : this list of eBPF links/resources by Quentin Monnet is really exhaustive/amazing
from twitter
16 days ago
Twitter
RT : ios-inject-custom - example showing how to use Frida for standalone injection of a custom payload by
from twitter
21 days ago
GitHub - intelxed/xed: x86 encoder decoder
RT : Pin's disassembler, (Intel XED) is open source now:
The reference is here:
from twitter
22 days ago
Untitled (https://intelxed.github.io/)
RT : Pin's disassembler, (Intel XED) is open source now:
The reference is here:
from twitter
22 days ago
Twitter
RT : Big one: SMB exploit (fixed in MS17-010+) now ported to Windows 2000 up to Windows Server 2016, and all versions in…
from twitter
23 days ago
Twitter
RT : Check out our _accessible_ Meltdown and Spectre explainer, made for developers without a background in computer arc…
from twitter
24 days ago
Twitter
RT : Detangle is now open-source. You can specify a list of "internal sites" to be opened in your main browser, while ot…
from twitter
24 days ago
Redirecting…
RT : How a malicious seed generation website stole $4 million :
from twitter
25 days ago
Twitter
RT : How a malicious seed generation website stole $4 million :
from twitter
25 days ago
Untitled (https://www.youtube.com/watch?v=Xczk598svvM)
RT : Very interesting talk about sandbox mitigations on Windows 10 by
Video:
Slides:
from twitter
25 days ago
Full Account Takeover through CORS with connection Sockets
RT : Below I share with you my write up "Full Account Takeover through CORS with connection Sockets", thanks
bugbounty  from twitter
26 days ago
Twitter
RT : Today we open-source Psychlab – a platform built on DeepMind Lab, designed to bridge the gap between AI and cogniti…
from twitter
27 days ago
Twitter
RT : frida-wshook: an analysis and instrumentation tool which uses to hook common functions oft…
from twitter
29 days ago
Twitter
RT : 🎬 New Tutorial Video 🎬

Analyze JavaScript and VBScript Malware With API Hooking and x64dbg!…
from twitter
29 days ago
Twitter
RT : RCE vulnerability in Electron framework affects Skype, Signal, Wordpress and Slack that run on Microsoft Windows…
from twitter
29 days ago
Twitter
RT : SSD Advisory – Oracle VirtualBox () Multiple Guest to Host Escape Vulnerabilities

For more details:…
from twitter
4 weeks ago
Twitter
RT : I believe we should share the knowledge as much as possible. Hence I decided to write about what I did some time ag…
from twitter
4 weeks ago
Twitter
RT : New blog entry: A Walk-Through Tutorial, with Code, on Statically Unpacking the FinSpy VM: Part One, x86 Deobfuscat…
from twitter
4 weeks ago
abatchy's blog | [Kernel Exploitation] 6: NULL pointer dereference
RT : Kernel Exploitation (Part 6): NULL pointer dereference: ,5 - Integer Overflow :…
from twitter
4 weeks ago
Twitter
RT : Kernel Exploitation (Part 6): NULL pointer dereference: ,5 - Integer Overflow :…
from twitter
4 weeks ago
XPN InfoSec Blog
RT : Universal XSS vulnerability via Evernote Web Clipper extension
cybersecurity  infosec  from twitter
4 weeks ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 159460 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade beroot bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost blueteam bluetooth bm book books boot boot2root bootkit bro_ids browser browsers brucon bruteforce bruteforcer bsideschallenge bsideslisbon bsideslondon bugbounty burp bypass campc canvas capstone capstoneinside captcha capture centos charliehebdo chart cheatsheet checkitout checklist chisel chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf confoo connections crack crackme crawler cronjob crossplatformdisassembler crosssitescripting crowbar crypto cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber cyber_warfare cybercrime cybersecurity dahboo7 dailywtf data dataexfiltrationtoolkit datascience db dbgkit dc4420 deal deals debugger debugging decompiler deeplearning defcon defense derbycon design det detection dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dl dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption equationgroup erlang escalating ettercap event exploit exploitation exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny future fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git github gnome gnu golang google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackerone hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitb2017ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec infrastructure injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan jaff java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kekeo kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning macos macosx mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking neutrinobot news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pe penetrationtest pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy privilegeescalation processexplorer productivity programming proxy pshitt pwn2own python qt quotes ransomware raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remcos remwa repy2exe retrogaming reverse reverse_engineering reverseengineering reversing rkt rodeoide root rop ror rowhammer ruby ructfe samba sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shadowbrokers shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source sp17 space splunk sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tbt tech terminal testbed thn threat threathunting tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 uefi ui unix url usa usb usenix vault7 video videos vietnam virginia virtualization viz vm voip volatility vpn vulnerability vulnhub waf wearables web web-dev web2py webapp webdev websec websecurity webvulscan wii wikileaks win windbg windows windows8 wordpress worldphotographyday wpa wpscan writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: