Tim Strazzere (@timstrazz) 's Twitter Profile
Tim Strazzere

@timstrazz

Mobile, Drone & (automated) Vehicle Security Researcher and Malware Analyst, Tweets are my own not my employers

ID: 41260072

linkhttps://rednaga.io calendar_today20-05-2009 01:09:21

28,28K Tweet

8,8K Followers

363 Following

Лёша Кластер (@cluster_m) 's Twitter Profile Photo

Мне тут надо было WireGuard из России пробросить, и я на скорую руку родил такую штуку: github.com/ClusterM/wg-ob… Целую вечность не работал с сокетами на уровне системных вызовов.

Maxime Rossi Bellom (@max_r_b) 's Twitter Profile Photo

Better late than never! The slides of our talk "Attacking Samsung Galaxy A* Boot Chain" at offensivecon can be found here: github.com/quarkslab/conf… The video is also available: youtube.com/watch?v=WJ7wkJ…

Daniel Lemire (@lemire) 's Twitter Profile Photo

The fast JavaScript runtime Bun is much faster than Node.js 22 at decoding Base64 inputs. By much faster, I mean *several times* faster. But they both rely on the same underlying library (simdutf) for the actual decoding. So what gives? The problem is that Node.js needs to

The fast JavaScript runtime Bun is much faster than Node.js 22 at decoding Base64 inputs. By much faster, I mean *several times* faster. But they both rely on the same underlying library (simdutf) for the actual decoding.

So what gives?

The problem is that Node.js needs to
Alba 🌸 (@mildsunrise@tech.lgbt) (@mild_sunrise) 's Twitter Profile Photo

hmm, if I understood this correctly, in v8 some strings may have Is[External]OneByte() return false, even though they are internally 8-bit. why is that?

datalocaltmp (@datalocaltmp) 's Twitter Profile Photo

Excited to talk at REcon about a tool I've been working on to generate frida scripts to visualize coverage for the Android Java layer; hope you can make it! cfp.recon.cx/recon2024/talk…

Excited to talk at <a href="/reconmtl/">REcon</a> about a tool I've been working on to generate frida scripts to visualize coverage for the Android Java layer; hope you can make it!

cfp.recon.cx/recon2024/talk…
Jiska (@naehrdine) 's Twitter Profile Photo

While everyone is trying to break Bluetooth's cryptographic protocols, Jonas found a pairing bypass in the proprietary "Fast Connect" protocol in AirPods 🎧 More details in his blog post: blogs.gnome.org/jdressler/2024…

Battle Programmer Yuu (@netspooky) 's Twitter Profile Photo

Another banger from retr0id "Jailbreaking RabbitOS (The Hard Way)". It's got everything: secureboot bypasses, an Android bootkit, a tethered USB jailbreak over WebSerial, GPL violations, and highly questionable logging practices. A very fun read !! da.vidbuchanan.co.uk/blog/r1-jailbr…

Another banger from retr0id "Jailbreaking RabbitOS (The Hard Way)".

It's got everything: secureboot bypasses, an Android bootkit, a tethered USB jailbreak over WebSerial, GPL violations, and highly questionable logging practices.

A very fun read !!

da.vidbuchanan.co.uk/blog/r1-jailbr…
Meysam (@r00tkitsmm) 's Twitter Profile Photo

Holy Mother Dragon, what a blogpost about CoreSight. ARMored CoreSight: Towards Efficient Binary-only Fuzzing ricercasecurity.blogspot.com/2021/11/armore…

Ryan M (@grimdoomer) 's Twitter Profile Photo

Here’s a blog post covering all the technical details behind a strcpy bug I found in the Tony Hawk video game series that can be used to hack several gaming consoles and even get RCE on the over the network icode4.coffee/?p=954