|
Oryan De Paz
@
OryanDP
Israel
|
|
Interested in infosec, especially in Windows Internals 💙 Reverse Engineering 💚 and CTFs ❤ (oh and did I mention Windows Internals already? 😉)
|
|
|
298
Твиты
|
216
Читаемые
|
1 089
Читатели
|
| Твиты |
|
Oryan De Paz
@OryanDP
|
3 ч. |
|
|
||
|
Oryan De Paz
@OryanDP
|
6 ч. |
|
Such a great HyperV day 😍
|
||
|
|
||
|
Oryan De Paz
@OryanDP
|
13 ч. |
|
Reading about the first steps in HyperV research (my favorite!) from a talented researcher like @AmarSaar - leaves me speechless. ✨
If you're into Windows / Virtualization / both 🙃, this inspiring post is a must! twitter.com/AmarSaar/statu…
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Alex Ionescu
@aionescu
|
16 ч. |
|
I know I've kept lots of people waiting, because "it wasn't ready yet", but at this point, I think the current PoC is good enough. Introducing "Simpleator": github.com/ionescu007/Sim…, an emulator that leverages the new Windows Hyper-V Platform API. cc @PetrBenes @Virtual_Hannah pic.twitter.com/7b8V73LVit
|
||
|
|
||
|
Oryan De Paz
@OryanDP
|
9 дек. |
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
0verfl0w
@0verfl0w_
|
8 дек. |
|
So it's been a while since my last post, and I've got a few emails asking how to get into malware analysis, so I've compiled a list of all the resources I used to get to the point I am at, which you can find here: 0ffset.wordpress.com/2018/12/08/get…
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Alex Ionescu
@aionescu
|
6 дек. |
|
The scripts and tools that @pwissenlit and I used to learn and pwn the Windows Notification Facility (WNF) at Black Hat 2018 this year are now posted on our repository: github.com/ionescu007/wnf….
Please remember to apply November's Patch Tuesday patches!
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Virus Bulletin
@virusbtn
|
6 дек. |
|
Presenting at conferences is an important part of many a security researcher's job. @verovaleros shares some Dos and Don'ts of presenting in public medium.com/@verovaleros/d…
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
GeoSn0w
@FCE365
|
2 дек. |
|
RELEASE: A write-up on how to do Kernel debugging for fun and profit in 2018 on macOS with practical examples for beginners! Please give feedback :P geosn0w.github.io/Debugging-macO…
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Essy
@casheeew
|
2 дек. |
|
List of Awesome Red Teaming Resources movaxbx.ru/2018/10/31/lis…
|
||
|
|
||
|
Oryan De Paz
@OryanDP
|
2 дек. |
|
Waiting for the pictures!
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Ben Hawkes
@benhawkes
|
30 нояб. |
|
Project Zero blog: "Injecting Code into Windows Protected Processes using COM - Part 2" by @tiraniddo - googleprojectzero.blogspot.com/2018/11/inject…
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Hadar Feldman
@HadarFeldman
|
29 нояб. |
|
Check out my new blog on how Windows Defender ATP new risk calculation exposed a targeted attack! cloudblogs.microsoft.com/microsoftsecur… via @msftsecurity
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Joxean Koret
@matalaz
|
29 нояб. |
|
I just uploaded a rather basic IDA Python plugin (script) named #IDAMagicStrings. It lets us rename functions based on the source code file it belongs to or rename a set of functions to guessed filenames, for example. The source code is available here: github.com/joxeankoret/id…
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Andrea Allievi
@aall86
|
28 нояб. |
|
techcommunity.microsoft.com/t5/Windows-Ker… First official blog post of my team! Great reading... expect more soon! @TheRealHariP
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Nicolas Krassas
@Dinosn
|
25 нояб. |
|
Capture The Flag - An Introduction To Binary Exploitation github.com/tharina/BlackH…
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Katharina Männle
@mnnle
|
24 нояб. |
|
Slides and challenges from my workshop on binary exploitation @Blackhoodie_RE: github.com/tharina/BlackH… #blackhoodie18
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
Jimmy Wylie
@mayahustle
|
21 нояб. |
|
IDA's remote debugger is my go-to for debugging malware so that I never have to restore my VM and lose. If you're interested in trying it, I've attached some instructions on how to set it up to debug a DLL. (1/4) #malware #reverseengineering
|
||
|
|
||
| Oryan De Paz ретвитнул(а) | ||
|
chiliz
@chiliz16
|
21 нояб. |
|
still hyped about #blackhoodie18 :) impressive talks, an amazing spirit, great conversations.. I learned a lot and I never thought giving a workshop would be _that_ much fun :D can only recommend. My material including slides and exercises: github.com/chiliz16/ROP-W…
|
||
|
|
||