FatalSec (@secfatal) 's Twitter Profile
FatalSec

@secfatal

Technology enthusiast and mobile security researcher experienced in pentesting of mobile apps. Reach out at [email protected] for technical consultation.

ID: 1578015885444673538

calendar_today06-10-2022 13:35:11

92 Tweet

437 Followers

93 Following

FatalSec (@secfatal) 's Twitter Profile Photo

#ARMv8 #assembly #shift #rotations Published a new video showcasing LSL, LSR, ROR instructions. In this lesson, you'll learn how to write ARMv8 assembly code to utilize these operators and explore what happens to each individual bit in the register. youtu.be/jgZ-Qi01rHQ

radare (@radareorg) 's Twitter Profile Photo

Updates on #r2ai: - added auto mode to decai with all models - Support Gemini and X.AI - Started full C rewrite (no more Python/JS) - Use gpt4-turbo for 128K context instead of 8K on OpenAI - Recursive decompilation to inline stubs and better type propagation

Govind Sharma (@apkunpacker) 's Twitter Profile Photo

Curious about mastering radare2? This Advent guide is perfect for both beginners and experts. It covers the essentials step-by-step, making it simple to learn from scratch. Start your journey here: rada.re/advent/ radare #aor24

FatalSec (@secfatal) 's Twitter Profile Photo

How to track which instruction modifies a specific memory location or finding the memory address of your target value? This video covers how to use Frida’s new setHardwareBreakpoint API to tackle these challenges! Frida Ole André V. Ravnås Mobile Security youtu.be/qmvp0OgatR0

FatalSec (@secfatal) 's Twitter Profile Photo

Happy New Year 2025🎉🎉 Elevate your mobile security expertise with FatalSec! Our YouTube channel is your ultimate resource for hands-on experience in mobile security. Explore latest videos on the channel: youtube.com/@fatalsec #MobileSecurity #AndroidSecurity #iOSSecurity

FatalSec (@secfatal) 's Twitter Profile Photo

Struggling with Android app crashes? 🛠️ Learn to reverse engineer crash logs like a pro: •Use adb & logcat to access logs •Filter with grep for your app •Spot exceptions & stack traces •Decompile with JD-GUI/JADX to debug youtube.com/shorts/kLjtZhQ…

Joseph Ravichandran (@0xjprx) 's Twitter Profile Photo

CVE-2025-24118 is an absolutely crazy race condition I found in the macOS / XNU kernel. Safe memory reclamation, read-only objects, memcpy implementation details, and a race condition- oh my! jprx.io/cve-2025-24118

FatalSec (@secfatal) 's Twitter Profile Photo

AI is reshaping reverse engineering! As security researchers, we must adapt. In this video, I’ll show you how to use R2 AI to decompile binaries into high-level code like C, Swift & Java. #AI #ReverseEngineering #CyberSecurity #Decompiling radare youtu.be/f9-fop5dttg

quarkslab (@quarkslab) 's Twitter Profile Photo

There is a small bug in the signature verification of OTA packages in the Android Open Source Framework. Official builds doing normal double verification of packages are not vulnerable but OEMs and third party apps may be. Jérémy Jourdois explains it here: blog.quarkslab.com/aosp_ota_signa…

Eduardo Novella (@enovella_) 's Twitter Profile Photo

After 2 years from the last release, APKiD v3.0.0 is out !🔥 - "Black Hawk edition" 📃 Changelog: github.com/rednaga/APKiD/… 🐍 Pypi package: `$ pip install --upgrade apkid` Thanks to Abhi for the stunning work 🙌

OffSec (@offsectraining) 's Twitter Profile Photo

Attention Kali Linux users! In the coming day(s), apt update is going to fail for pretty much everyone. The reason? We had to roll a new signing key for the Kali repository. You need to download and install the new key manually: offs.ec/4lUEtak

Attention <a href="/kalilinux/">Kali Linux</a> users! In the coming day(s), apt update is going to fail for pretty much everyone. 

The reason? We had to roll a new signing key for the Kali repository. You need to download and install the new key manually: offs.ec/4lUEtak
FatalSec (@secfatal) 's Twitter Profile Photo

Want to learn how to read and hack C structures directly from memory using Frida? Check out this demo where we break it down step by step! Watch now: youtu.be/ozUMyCYiKOQ Mobile Security #Frida #ReverseEngineering #CStructures #frida #MemoryHacking

eShard (@eshard) 's Twitter Profile Photo

Our journey with the #iOS emulator continues. We show how we reached the home screen, enabled multitouch, unlocked network access, and started running real apps 👉 eshard.com/posts/emulatin…

Our journey with the #iOS emulator continues.

We show how we reached the home screen, enabled multitouch, unlocked network access, and started running real apps 👉 eshard.com/posts/emulatin…
FatalSec (@secfatal) 's Twitter Profile Photo

Build an AI-Powered Reverse Engineering Lab with Ghidra & Ollama! Learn how to supercharge your binary analysis with local LLMs. 💻🤖 Watch now 👉 youtu.be/WOsVlzEXxJk #ReverseEngineering #Ghidra #AI #Ollama #CyberSecurity

FatalSec (@secfatal) 's Twitter Profile Photo

Learn how to intercept & decrypt encrypted traffic in Flutter Android apps – even with SSL pinning & obfuscation! Perfect for #MobileSecurity & #AppPentesting pros. 📺 Watch now: youtu.be/Pw4_lepwVEs #Flutter #CyberSecurity #Frida #ReverseEngineering #AESDecryption