Jack Black, Jr (@xjrjackblack) 's Twitter Profile
Jack Black, Jr

@xjrjackblack

ID: 1688799338938486784

calendar_today08-08-2023 06:28:44

83 Tweet

15 Followers

252 Following

Pavel Yosifovich (@zodiacon) 's Twitter Profile Photo

Process hollowing isn’t always “unmap and replace.” This post looks at a variant where the original image stays mapped, a second executable is mapped, and execution is redirected. Close enough to matter for defenders. trainsec.net/library/window…

Reverse Engineering and More (@re_and_more) 's Twitter Profile Photo

RE tip of the day: When you use rundll32.exe to debug a malicious DLL on a 64-bit system, use c:\windows\system32\rundll32.exe to debug 64-bit DLLs and c:\windows\syswow64\rundll32.exe to debug 32-bit DLLs (this is not a typo). #infosec #cybersecurity #malware #reverseengineering

RE tip of the day: When you use rundll32.exe to debug a malicious DLL on a 64-bit system, use c:\windows\system32\rundll32.exe to debug 64-bit DLLs and c:\windows\syswow64\rundll32.exe to debug 32-bit DLLs (this is not a typo).
#infosec #cybersecurity #malware #reverseengineering
Тsфdiиg (@tsoding) 's Twitter Profile Photo

The idea to name type Void as U0 in HolyC (the language of TempleOS) is kinda genius if you think about it. Its size is Zero, yes. And it is Unsigned because being Signed requires at least one bit. But the size is Zero. Checks out.

The idea to name type Void as U0 in HolyC (the language of TempleOS) is kinda genius if you think about it.   

Its size is Zero, yes. And it is Unsigned because being Signed requires at least one bit. But the size is Zero. Checks out.
Tib3rius (@0xtib3rius) 's Twitter Profile Photo

I am about to COMPLETELY disrupt the cybersecurity industry...💀💀💀 Presenting the Continuous Reasoning AI Pentester! Multiple AI agents running every security tool under the sun against your environment, at record speeds. Full pentests achieved in less than AN HOUR. Zero

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🌏 Browser Exploitation 101: A Series of Blog posts for anyone interested in Chrome Browser Exploitation. Part 1: jhalon.github.io/chrome-browser… Part 2: jhalon.github.io/chrome-browser… Part 3: jhalon.github.io/chrome-browser… #infosec

🌏 Browser Exploitation 101: A Series of Blog posts for anyone interested in Chrome Browser Exploitation.

Part 1: jhalon.github.io/chrome-browser…
Part 2: jhalon.github.io/chrome-browser…
Part 3: jhalon.github.io/chrome-browser…

#infosec
Objective-See Foundation (@objective_see) 's Twitter Profile Photo

Just released: RansomWhere? v2.0 By monitoring file entropy in real time, RansomWhere? can generically thwart ransomware! Version 2.0 is a full rewrite leveraging Apple’s Endpoint Security framework, plus a host of other improvements. Read more: patreon.com/posts/152088413

Just released: RansomWhere? v2.0

By monitoring file entropy in real time, RansomWhere? can generically thwart ransomware!

Version 2.0 is a full rewrite leveraging Apple’s Endpoint Security framework, plus a host of other improvements.

Read more:
patreon.com/posts/152088413
onejailbreak (@onejailbreak_) 's Twitter Profile Photo

📦LiveContainer IPA Installer can run an unlimited number of apps for free without TrollStore or a jailbreak 🔖 onejailbreak.com/blog/unlimited… Here's a full guide on how to install LiveContainer on any iPhone or iPad! It works on-device🚀

📦LiveContainer IPA Installer can run an unlimited number of apps for free without TrollStore or a jailbreak 🔖

onejailbreak.com/blog/unlimited…

Here's a full guide on how to install LiveContainer on any iPhone or iPad! It works on-device🚀