Mohammad Reza Ahmadi (@_hidden_cloud_) 's Twitter Profile
Mohammad Reza Ahmadi

@_hidden_cloud_

ID: 1555972190910160898

calendar_today06-08-2022 17:41:21

95 Tweet

30 Takipçi

609 Takip Edilen

Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

Dropping #Downfall, exploiting speculative forwarding of 'Gather' instruction to steal data from hardware registers. #MeltdownSequel - Practical to exploit (POC/Demo) - Defeat all isolation boundaries (OS, VM, SGX) - Bypass all Meltdown/MDS mitigations. downfall.page

Tavis Ormandy (@taviso) 's Twitter Profile Photo

New write-up on an Intel Ice Lake CPU vulnerability, we can effectively corrupt the RoB with redundant prefixes! 🔥 An updated microcode is available today for all affected products, cloud providers should patch ASAP. lock.cmpxchg8b.com/reptar.html

Boris Larin (@oct0xor) 's Twitter Profile Photo

We're revealing details of an obscure debugging feature in the Apple A12-A16 SoC’s that bypasses all of the hard-to-hack hardware-based memory protections on new iPhones. Its not used by the firmware and we don't know how the attackers found out about it. securelist.com/operation-tria…

Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

I get lots of requests for recommended resources for learning Windows, exploitation, VR, etc. I have some good links but there’s lots of others I don’t know or forgot about. Give me your best suggestions please! Feel free to link your own stuff, I wanna see it!

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Alright, Discord server created. I will be giving away some cool schwag from Hex-Rays SA, along with a free IDA Named license with Hex-Rays decompiler! Details coming soon... discord.gg/ycTkB5FE

TyphoonCon🌪️ (@typhooncon) 's Twitter Profile Photo

📷We’re excited to announce the second training session for #TyphoonCon24: “Fuzzing & Attacking Deeply Embedded Devices” by Tobias Scharnowski (Tobias Scharnowski) & Marius Muench (nSinus-R (@[email protected])). Learn more and register: eventbrite.com/e/typhooncon-2…

📷We’re excited to announce the second training session for #TyphoonCon24: “Fuzzing &amp; Attacking Deeply Embedded Devices” by Tobias Scharnowski (<a href="/ScepticCtf/">Tobias Scharnowski</a>) &amp; Marius Muench (<a href="/nSinusR/">nSinus-R (@nsr@infosec.exchange)</a>).

Learn more and register: eventbrite.com/e/typhooncon-2…
Tim Misiak (@timmisiak) 's Twitter Profile Photo

New WinDbg tutorial video: More powerful conditional breakpoints in WinDbg! Breakpoints that check values, callers, and run scripts as a condition before breaking into the debugger. augmend.com/replay/4ceb728…

Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

🤩 We’ve got some big news to share 🤩 IDA 8.4 is now released 🚀Get ready for an improved, polished, and much more convenient version! Read the details and get it now 🌐 hex-rays.com/blog/introduci… #IDAPro #HexRays #NewRelease

🤩 We’ve got some big news to share 🤩 IDA 8.4 is now released 🚀Get ready for an improved, polished, and much more convenient version! Read the details and get it now 🌐 hex-rays.com/blog/introduci…

#IDAPro #HexRays #NewRelease
Alee Amini🐞 (@aleeamini) 's Twitter Profile Photo

The second part of the #ELFStory series has been prepared. In this part, I explained the elf header structure in detail. I tried to say everything in simple and clear ways to understand the complexities of binary files. Hope you enjoy it. #Elf_story aleeamini.com/elfs-story-par…

Alee Amini🐞 (@aleeamini) 's Twitter Profile Photo

The third part of the #elfsstory series is ready. In this part, I have written in detail about the section headers. I will write about the content and mission of each section in the next part. #ELFStory #Elf #Linux #binary aleeamini.com/elfs-story-par…

HyperDbg (@hyperdbg) 's Twitter Profile Photo

HyperDbg v0.8.2 is now released!🔥 This update brings support for functions in the script engine. Read more: docs.hyperdbg.org/commands/scrip…

HyperDbg (@hyperdbg) 's Twitter Profile Photo

🎉HyperDbg's #Telegram group is active!🚀 Join our community of developers, debugging, and reversing enthusiasts. We'll discuss hypervisors, HyperDbg, and the latest hypervisor-based reversing techniques! We would be happy to have you there! 😊 t.me/HyperDbg

Joe Grand (@joegrand) 's Twitter Profile Photo

This was a super fun project and a reminder about the lasting effects of security problems long after they're patched. youtube.com/watch?v=o5IySp…

Alee Amini🐞 (@aleeamini) 's Twitter Profile Photo

The fourth part of the #elfstory is ready. In this part, I wrote about the sections of ELF files, which have been examined in detail and very deeply. #elfsstory #elf_story #elfstory #elf #elf_file aleeamini.com/elfs-story-par…

Alee Amini🐞 (@aleeamini) 's Twitter Profile Photo

Dive deep into the #overflow problem within the #wtoi function of the #MSVCRT library and discover how attackers can easily bypass AVs/EDRs detections. Enabling attackers to easily #dump from #LSASS and perform other malicious activities. aleeamini.com/overflow-in-wt…

Alee Amini🐞 (@aleeamini) 's Twitter Profile Photo

🚀 The 5th part of the #ELFStory is now live! In this edition, I dive deep into how executable files are mapped to memory by the dynamic loader. Learn about the critical role of memory segments and dynamic linking works behind the scenes. aleeamini.com/elf-story-part5 #ELF #LINUX