Твиттер | Поиск | |
Oryan De Paz
Interested in infosec, especially in Windows Internals 💙 Reverse Engineering 💚 and CTFs ❤ (oh and did I mention Windows Internals already? 😉)
298
Твиты
216
Читаемые
1 089
Читатели
Твиты
Oryan De Paz 3 ч.
Reply Retweet Нравится
Oryan De Paz 6 ч.
В ответ @AmarSaar
Such a great HyperV day 😍
Reply Retweet Нравится
Oryan De Paz 13 ч.
Reading about the first steps in HyperV research (my favorite!) from a talented researcher like - leaves me speechless. ✨ If you're into Windows / Virtualization / both 🙃, this inspiring post is a must!
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Alex Ionescu 16 ч.
I know I've kept lots of people waiting, because "it wasn't ready yet", but at this point, I think the current PoC is good enough. Introducing "Simpleator": , an emulator that leverages the new Windows Hyper-V Platform API. cc
Reply Retweet Нравится
Oryan De Paz 9 дек.
В ответ @j0nathanj @RealWorldCTF
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
0verfl0w 8 дек.
So it's been a while since my last post, and I've got a few emails asking how to get into malware analysis, so I've compiled a list of all the resources I used to get to the point I am at, which you can find here:
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Alex Ionescu 6 дек.
The scripts and tools that and I used to learn and pwn the Windows Notification Facility (WNF) at Black Hat 2018 this year are now posted on our repository: . Please remember to apply November's Patch Tuesday patches!
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Virus Bulletin 6 дек.
Presenting at conferences is an important part of many a security researcher's job. shares some Dos and Don'ts of presenting in public
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
GeoSn0w 2 дек.
RELEASE: A write-up on how to do Kernel debugging for fun and profit in 2018 on macOS with practical examples for beginners! Please give feedback :P
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Essy 2 дек.
List of Awesome Red Teaming Resources
Reply Retweet Нравится
Oryan De Paz 2 дек.
В ответ @j0nathanj @RealWorldCTF
Waiting for the pictures!
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Ben Hawkes 30 нояб.
Project Zero blog: "Injecting Code into Windows Protected Processes using COM - Part 2" by -
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Hadar Feldman 29 нояб.
Check out my new blog on how Windows Defender ATP new risk calculation exposed a targeted attack! via
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Joxean Koret 29 нояб.
I just uploaded a rather basic IDA Python plugin (script) named . It lets us rename functions based on the source code file it belongs to or rename a set of functions to guessed filenames, for example. The source code is available here:
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Andrea Allievi 28 нояб.
First official blog post of my team! Great reading... expect more soon!
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Nicolas Krassas 25 нояб.
Capture The Flag - An Introduction To Binary Exploitation
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Katharina Männle 24 нояб.
Slides and challenges from my workshop on binary exploitation :
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
Jimmy Wylie 21 нояб.
IDA's remote debugger is my go-to for debugging malware so that I never have to restore my VM and lose. If you're interested in trying it, I've attached some instructions on how to set it up to debug a DLL. (1/4)
Reply Retweet Нравится
Oryan De Paz ретвитнул(а)
chiliz 21 нояб.
still hyped about :) impressive talks, an amazing spirit, great conversations.. I learned a lot and I never thought giving a workshop would be _that_ much fun :D can only recommend. My material including slides and exercises:
Reply Retweet Нравится