Xappy (@thexappy) 's Twitter Profile
Xappy

@thexappy

Security Researcher 🩺
Into Windows(.NET)/iOS/protocols reversing and forensics.

ID: 1182730373387735041

calendar_today11-10-2019 18:51:26

538 Tweet

139 Followers

574 Following

Olaf Hartong (@olafhartong) 's Twitter Profile Photo

Adding to my ETW research toolkit, a tiny program to consume information from a provider with as little overhead as possible. PockETWatcher, a tool to get the essential information from a ETW provider to the CLI or a JSON file github.com/olafhartong/Po…

Washi (@washi_dev) 's Twitter Profile Photo

After #flareon11 challenge 7, I got inspired to build tooling for #dotnet Native AOT reverse engineering. As such, I built a #Ghidra Analyzer that can automatically recover most .NET types, methods and frozen objects (e.g., strings). Blog:👉blog.washi.dev/posts/recoveri…

After #flareon11 challenge 7, I got inspired to build tooling for #dotnet Native AOT reverse engineering.

As such, I built a #Ghidra Analyzer that can automatically recover most .NET types, methods and frozen objects (e.g., strings).

Blog:👉blog.washi.dev/posts/recoveri…
marc ochsenmeier (@ochsenmeier) 's Twitter Profile Photo

Centralized resource for listing and organizing known injection techniques and POCs #malware #dfir github.com/itaymigdal/awe…

Xappy (@thexappy) 's Twitter Profile Photo

Ever wondered what your modem really says to your SIM card? I sniffed raw APDU traffic off the SIM pins, decoded the UART based on the ATR, and piped it into Wireshark. Full guide: how to wire it, decode it, and see the bytes for yourself. 🔎💥📶 github.com/theXappy/trace…

Ever wondered what your modem really says to your SIM card?

I sniffed raw APDU traffic off the SIM pins, decoded the UART based on the ATR, and piped it into Wireshark.

Full guide: how to wire it, decode it, and see the bytes for yourself.
🔎💥📶
github.com/theXappy/trace…