
Luke
@datalocaltmp
mobile reverse engineering, vulnerability research, using lldb
ID: 1093925535074406403
https://s11research.com/training/ 08-02-2019 17:32:26
426 Tweet
865 Takipçi
502 Takip Edilen





Wrapped up an incredible time teaching #PatchDiffingInTheDark in Austin, TX with ringzerø.training && @[email protected] ! The city didn’t disappoint—amazing food, friendly people, and my first autonomous vehicle ride!🤖 🚗✨ #waymo

Tested GhidraMCP for RE on stripped binaries - specifically the URL validation functions in Messenger (see my EkoParty talk). It reached the same conclusions in under a minute - may have took me a moment longer 👀 S/O LaurieWired for the awesome tool - github.com/LaurieWired/Gh…




Enjoying the Tokyo skyline with my mate courtesy of my friends at Bug Bounty Argentina and Ekoparty | Hacking everything - beautiful day to be a hacker!



Respect and blessings 🙇 And big ❤️ to my good friend, a true homie Luke (Luke (datalocaltmp)) he is a real OG for the amount of content he has shared to the community and at conferences around the world. This award really means a lot as it reinforces that sharing really is caring.




EXTRA EXTRA 📣📰 exploits.club #79 OUT NOW! WhatsApp bugs from Luke (datalocaltmp) immortalp0ny finds a 20 year old NTFS vuln Forgotten syzkaller reports with Hoàng Hải Long 🇻🇳 Atredis Partners alks Lenovo LPEs + Jobs and MORE 👇 blog.exploits.club/exploits-club-…



