vmcall (@vm_call) 's Twitter Profile
vmcall

@vm_call

reverse engineer. founder of @the_secret_club. defcon ctf finalist @0rganizers.

ID: 3305968570

linkhttps://secret.club/author/vmcall calendar_today01-06-2015 19:49:40

608 Tweet

6,6K Followers

256 Following

namazso (@namazso) 's Twitter Profile Photo

I made a new auto-separated x86 ISA reference page: namazso.github.io/x86/ Source for generator coming soon™️, I just want to get CI working. Also, it has dark mode

I made a new auto-separated x86 ISA reference page: namazso.github.io/x86/

Source for generator coming soon™️, I just want to get CI working.

Also, it has dark mode
Daax (@daaximus) 's Twitter Profile Photo

I had an inquiry about ACPI checks, and decided to run through how they work and how to mitigate them on VMware and QEMU. It's a quick and dirty write-up, so excuse the brevity. revers.engineering/evading-trivia…

x64dbg (@x64dbg) 's Twitter Profile Photo

The first commit of x64dbg was 10 years ago today (2013-05-19). Writing a retrospective is harder than I thought, but here is a screenshot of the first version as a sneak peak. Thanks to everybody in the community for the support over the years! Duncan

The first commit of x64dbg was 10 years ago today (2013-05-19). Writing a retrospective is harder than I thought, but here is a screenshot of the first version as a sneak peak. Thanks to everybody in the community for the support over the years!

Duncan
stacksmashing (@ghidraninja) 's Twitter Profile Photo

This is crazy. An iOS KeePass app was sending the clipboard contents *unencrypted via UDP* to a server. The developer "fixed" it by still sending it via UDP, but this time with fixed key and IV. 🤦‍♂️ The app is simply a credential stealer and probably in violation of some laws.

This is crazy. An iOS KeePass app was sending the clipboard contents *unencrypted via UDP* to a server. The developer "fixed" it by still sending it via UDP, but this time with fixed key and IV. 🤦‍♂️

The app is simply a credential stealer and probably in violation of some laws.
Daax (@daaximus) 's Twitter Profile Photo

I got time to update a draft that should've been published long ago. Here is a fun PG-compliant hooking mechanism, and the example covered in the article is system-wide SYSCALL hooks in a PG-compliant manner. revers.engineering/fun-with-pg-co…

Ulf Frisk (@ulffrisk) 's Twitter Profile Photo

MemProcFS 5.9 released! Fast and easy to use memory forensics in a virtual file system! Many smaller updates, built-in yara rules causing a detection are now shown directly in FindEvil! github.com/ufrisk/MemProc…

Can Bölük (@_can1357) 's Twitter Profile Photo

> Want to reverse engineer notepad.exe for lulz to figure out what hotkey is toggling right-to-left reading order because I keep hitting it accidentally > MBA obfuscated imports

> Want to reverse engineer notepad.exe for lulz to figure out what hotkey is toggling right-to-left reading order because I keep hitting it accidentally
> MBA obfuscated imports
Justas Masiulis (@justasmasiulis) 's Twitter Profile Photo

🚨 Trying to find the NTDLL base? 🔥 EDRs ♿ hate this ONE WEIRD TRICK! LEARN HOW YOU 🫵 CAN TOO! #shocking #redteamtips #security #redteam

🚨 Trying to find the NTDLL base?
🔥 EDRs ♿ hate this ONE WEIRD TRICK! LEARN HOW YOU 🫵 CAN TOO!

#shocking #redteamtips #security #redteam