Ling (@ling_sec) 's Twitter Profile
Ling

@ling_sec

I do security things (sometimes)

ID: 1140992833236733952

linkhttp://ling.re calendar_today18-06-2019 14:41:04

193 Tweet

263 Followers

863 Following

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETresearch discovered a trojanized IDA Pro installer, distributed by the #Lazarus APT group. Attackers bundled the original IDA Pro 7.5 software developed by Hex-Rays SA with two malicious components. Anton Cherepanov 1/5

#ESETresearch discovered a trojanized IDA Pro installer, distributed by the #Lazarus APT group. Attackers bundled the original IDA Pro 7.5 software developed by <a href="/HexRaysSA/">Hex-Rays SA</a> with two malicious components. <a href="/cherepanov74/">Anton Cherepanov</a> 1/5
Nemi (@0xnemi) 's Twitter Profile Photo

Great article by @bryanmenegus talking about the current state of anti-cheating (feat. quotes from some of your favorite peeps): wired.com/story/kernel-a… Glad to see this article come out 👏

Parsia Hakimian (@cryptogangsta) 's Twitter Profile Photo

I wrote some stuff about how game package managers (e.g., Steam, Origin, etc.) handle game installations. It's a nightmare and full of compromises specially for old games. parsiya.net/blog/2022-02-0…

Fabio (@degrigis) 's Twitter Profile Photo

In other news, I've recently put together a big state of the art regarding symbolic execution techniques used in system research. Check out the slides here! 1/2 docs.google.com/presentation/d…

Maxim Goryachy (@h0t_max) 's Twitter Profile Photo

Today we've published Intel Microcode decryptor! It gives you an amazing opportunity for researching x86 platforms. You can understand how Intel mitigated spectre vulnerability, explore the implementation of Intel TXT, SGX,VT-x technologies! Enjoy it! github.com/chip-red-pill/…

Today we've published Intel Microcode decryptor! It gives you an amazing opportunity for researching x86 platforms. You can understand how Intel mitigated spectre vulnerability, explore the implementation of Intel TXT, SGX,VT-x technologies! Enjoy it! github.com/chip-red-pill/…
Ling (@ling_sec) 's Twitter Profile Photo

It's been a while. I open-sourced a project that obfuscates control flow using MBA, all done by your compiler at compile-time using a header-only library. github.com/ThatLing/limba

Geebz (@gbps111) 's Twitter Profile Photo

I just published the long-awaited Part 2 to my PCIe blog post series - "All About Memory: MMIO, DMA, TLPs, and more!" This post also includes a companion experiment where I dive into what pcileech looks like over a PCIe protocol analyzer. Please enjoy! ctf.re/kernel/pcie/tu…

Erwan Grelet (@ergrelet) 's Twitter Profile Photo

The slides and the code for my REcon talk “Seeing Through Themida’s Code Mutation” are available: - Slides: github.com/ergrelet/themi… - Deobfuscator Code: github.com/ergrelet/themi…

Tavis Ormandy (@taviso) 's Twitter Profile Photo

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n

This strange tweet got &gt;25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n
Colton Skees (@coltonskees) 's Twitter Profile Photo

(1) Decided to release the source code for my LLVM-based static binary analysis framework (github.com/Colton1skees/D…). It implements, among other things, an iterative control flow graph reconstruction algorithm heavily inspired by SATURN, using Remill and Souper.

Tom Warren (@tomwarren) 's Twitter Profile Photo

Valorant is winning the war against PC gaming cheaters. I've interviewed Riot Games' head of anti-cheat and it's clear that the investment into its Vanguard system is really paying off. Full interview below 👇 theverge.com/2024/11/4/2428…

Zerotistic (@gegrgtezrze) 's Twitter Profile Photo

Excited to share my latest blog post: "Breaking Control Flow Flattening: A Deep Technical Analysis" I showcase usage of formal proofs and graph theory to automate CFF deobfuscation, among other things ! Might make it a talk...? 👀 zerotistic.blog/posts/cff-remo…

Friendly Maltese Citizens (@malta_ctf) 's Twitter Profile Photo

Happy new year! Our 2024 Recap is here: - 6 CTFs won, including 2 DEFCON Prequalifiers - 1st meetup of ~80 members @ DEFCON - 19.5k mvms sent on Discord - Rank #2 global on CTFtime We're incredibly proud of all of our members and look forward to seeing everyone again next year!

Happy new year! Our 2024 Recap is here:
- 6 CTFs won, including 2 DEFCON Prequalifiers
- 1st meetup of ~80 members @ DEFCON
- 19.5k mvms sent on Discord
- Rank #2 global on CTFtime

We're incredibly proud of all of our members and look forward to seeing everyone again next year!
Rick de Jager (@rdjgr) 's Twitter Profile Photo

May I present to you; a full copy of doom, running inside of a Rollercoaster Tycoon 1 save game exploit ✨ Thanks for everyone that came to check out our DistrictCon Junkyard talk! We had a lot of fun putting it together. (check the thread for slides / exploit)

Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

We’re releasing our analysis of ring-1.io, a major game cheat targeted by multiple studios in recent legal actions. We partially deobfuscated several Themida-protected components and document how it hijacks Hyper-V to inject and manipulate game code.