Ch40zz (@ch40zz_) 's Twitter Profile
Ch40zz

@ch40zz_

Reverse Engineering, Windows Internals, Exploiting, Gamehacking
Programming Languages: C/C++, x86/x64 Assembly, C#, Python, JS, PHP

ID: 910927005692104704

calendar_today21-09-2017 18:01:37

59 Tweet

555 Takipçi

81 Takip Edilen

Michael Maltsev (@m417z) 's Twitter Profile Photo

Have you ever needed to get an earlier version of the Windows binary you're analyzing? Did you end up downloading Windows ISOs or update packages just for that? Not anymore! Introducing Winbindex: m417z.com/winbindex/ m417z.com/Introducing-Wi…

Astral (@astralvx) 's Twitter Profile Photo

Want to know how you attack the kernel via DMA? How the PCIe bus works, how the packets are structured, how IOMMU and DMA protection blocks you? astralvx.com/dma-explained/

Want to know how you attack the kernel via DMA? How the PCIe bus works, how the packets are structured, how IOMMU and DMA protection blocks you? astralvx.com/dma-explained/
namazso (@namazso) 's Twitter Profile Photo

Ever wishes opening stuff in IDA wasn't a guesswork of whether you need ida.exe or ida64.exe? You no longer have to: github.com/namazso/IDAShe…

𝕸𝓎𝖐𝖎𝖑𝖑 ☠️ (@mykill) 's Twitter Profile Photo

OK here's my RE tweet for 2021. In up-to-date Hex-Rays decompilers, clicking a brace character and hitting % (percent) will take you to the matching brace. This is a Vim-style keybinding that I have fervently wished for it until, one day, it just worked. Praise be to Hex-Rays SA

OK here's my RE tweet for 2021.

In up-to-date Hex-Rays decompilers, clicking a brace character and hitting % (percent) will take you to the matching brace.

This is a Vim-style keybinding that I have fervently wished for it until, one day, it just worked. Praise be to <a href="/HexRaysSA/">Hex-Rays SA</a>
Stefan Reinalter (@molecularmusing) 's Twitter Profile Photo

Making true on my promise, today I open-source my RawPDB library for reading Program Debug Database PDB files without DIA: github.com/MolecularMatte… Play around with it, share it, let me know what you think! I'm incredibly happy to finally get this into your hands. #cpp

Ch40zz (@ch40zz_) 's Twitter Profile Photo

Just open sourced my cheat for Enemy Territory. Unlike other cheats this one focuses on undetected hooking (without writing to read-only memory) and is generally mod independent: github.com/Ch40zz/CCHookR…

Can Bölük (@_can1357) 's Twitter Profile Photo

> Want to reverse engineer notepad.exe for lulz to figure out what hotkey is toggling right-to-left reading order because I keep hitting it accidentally > MBA obfuscated imports

&gt; Want to reverse engineer notepad.exe for lulz to figure out what hotkey is toggling right-to-left reading order because I keep hitting it accidentally
&gt; MBA obfuscated imports
vx-underground (@vxunderground) 's Twitter Profile Photo

Gamers express concern over anti-cheats and assert them to be spyware running as "root" on Windows. Malware doesn't need to be ran at an elevated privilege (especially "root") to achieve it's objective of exfiltrating sensitive information or "spying" on you by watching what

vx-underground (@vxunderground) 's Twitter Profile Photo

This YouTube Twitch Game Bro says he's been a hacker for 20 years and did anti cheat stuff at Blizzard He said he pulled it out into assembly, grabbed the code cave (?) and removed "the polymorphic" (?). What the fuck is this guy talking about youtube.com/shorts/LY2hG-_…