Pulsar (@pulsar_twt) 's Twitter Profile
Pulsar

@pulsar_twt

Let's do it

ID: 1130429329

calendar_today29-01-2013 08:20:10

20 Tweet

83 Followers

87 Following

eShard (@eshard) 's Twitter Profile Photo

Here's the part 2 of the #Pixel6 bootloader exploit. A bit more technical, we play with emulation framework Unicorn and work through ROP towards having read and write primitives.⬇️ eshard.com/posts/pixel6bo…

eShard (@eshard) 's Twitter Profile Photo

The part 3 is here! 👇 The next step on the exploitation of Google's #Pixel6 is to be able to directly execute our own code without using ROP programming. #AppSec #Android18 #cybersercurity eshard.com/posts/pixel6_b…

Pulsar (@pulsar_twt) 's Twitter Profile Photo

J'ai donné mon accord pour la collecte des données horaires le 16 Janvier 2023 sur mon Linky... Je trouve des données vieilles de plus de 2 mois cependant... 🤬 Enedis vous pouvez m'expliquez SVP? Respectez-vous les autorisations données par vos clients?

J'ai donné mon accord pour la collecte des données horaires le 16 Janvier 2023 sur mon Linky... Je trouve des données vieilles de plus de 2 mois cependant... 🤬

<a href="/enedis/">Enedis</a> vous pouvez m'expliquez SVP? Respectez-vous les autorisations données par vos clients?
Boris Larin (@oct0xor) 's Twitter Profile Photo

The recording of our (me, Leonid Bezvershenko, Georgy Kucherin) #37c3 talk “Operation Triangulation: What You Get When Attack iPhones of Researchers” was published! media.ccc.de/v/37c3-11859-o…

Pulsar (@pulsar_twt) 's Twitter Profile Photo

Getting one step closer to open source iPhone & SEP emulation on #QEMU thanks to github.com/ChefKissInc/QE… by Visual Ehrmanntraut and github.com/chris-pcguy!

eShard (@eshard) 's Twitter Profile Photo

We needed tools to perform advanced security investigations on iOS. But those tools didn’t exist yet... or weren’t openly available. So we created our own. We’ve fully emulated iOS on #QEMU using only open-source technologies. And this is just the beginning.

eShard (@eshard) 's Twitter Profile Photo

Behind every tap on your favorite app there's a chain of memory operations, network requests, and deep system activity. We recorded Spotify, Telegram, and Amazon using full-system emulation and time travel debugging. 👉eshard.com/posts/android-…

Behind every tap on your favorite app there's a chain of memory operations, network requests, and deep system activity.

We recorded Spotify, Telegram, and Amazon using full-system emulation and time travel debugging. 👉eshard.com/posts/android-…
eShard (@eshard) 's Twitter Profile Photo

We’ll trace what really happens inside Telegram when you send or receive a message. 📨 Learn how to capture clean execution traces for Time Travel Analysis, step by step. Register here: eshard.eventbrite.fr 👈 #android #cybersecurity #mobileapp #telegram

We’ll trace what really happens inside Telegram when you send or receive a message. 📨
Learn how to capture clean execution traces for Time Travel Analysis, step by step. Register here: eshard.eventbrite.fr 👈
#android #cybersecurity #mobileapp #telegram
eShard (@eshard) 's Twitter Profile Photo

Our journey with the #iOS emulator continues. We show how we reached the home screen, enabled multitouch, unlocked network access, and started running real apps 👉 eshard.com/posts/emulatin…

Our journey with the #iOS emulator continues.

We show how we reached the home screen, enabled multitouch, unlocked network access, and started running real apps 👉 eshard.com/posts/emulatin…