One of our ninjas (@_ixty_) wrote a series of articles explaining how to write a win32 keylogger that supports all input languages (that don't use input method editors). You can find below the last part which focuses on the text reconstruction process. synacktiv.com/publications/w…
One of our ninjas (@_ixty_) wrote a series of articles explaining how to write a win32 keylogger that supports all input languages (that don't use input method editors). You can find here the second part which focuses on keyboard layout DLLs. synacktiv.com/publications/w…
One of our ninjas (@_ixty_) wrote a series of articles explaining how to write a win32 keylogger that supports all input languages (that don't use input method editors). Here is the first part which focuses on capturing keyboard events!
synacktiv.com/publications/w…
Croissants, red wine and high-quality offensive security talks in a wonderful place? That's all the Hexacon team is promising for October 2022.
Details and Call For Papers are coming very soon... Until then, a bit more teasing for you folks: hexacon.fr#HEXACON2022
Patch your Packet Filter: OpenBSD & FreeBSD remote DoS in 2 IPv6 packets. Please don't fragment the Internet" #CVE-2019-5597 synacktiv.com/ressources/Syn…
My new blogpost: WoW64 internals - from the kernel initialization, through turbo thunks, "WoW64 functions", xtajit, CHPE, ... all the way to "Heaven's Gate" on ARM.
wbenny.github.io/2018/11/04/wow…
Props to jpanic, I was privileged enough to be the first to reverse engineer the most radical x86_64 Linux Virus ever written. This paper is old, but fascinating for Virus authors http://83.133.184.251/virensimulation.org/lib/vrn01.html
arm_now is a qemu powered tool that allows instant setup of VM for reversing/running binaries built for different CPU architectures. github.com/nongiach/arm_n…
47K Followers 2K FollowingChief Technical Innovation Officer @crowdstrike. Windows Internals author and trainer. He/Him. RTs are not endorsements, opinions are my own.
6K Followers 3K FollowingCTFer / APT hunter / RedTeam / BlueTeam
the member of @r3kapig
the leader of @ShadowChasing1
CVE-2022-30190
find job opportunities
opinions are own not group
17K Followers 1K FollowingMobile & Security Research | Founder @ZecOps (Acq. by JAMF) 🐊 & @ZIMPERIUM (Acq.) | #FreeTheSandbox✌ | ❤️ Chess | My random thoughts, only some are accurate.
6K Followers 962 FollowingCTO Office / Head of Infra & Security Research @Bloomberg. Interested in mathematical techniques for software, systems, and network analysis at world scale.
10K Followers 628 Following🤖 Marlin is the world's most popular firmware for 3D printers. Used by Prusa, Lulzbot, and many more! ❤️ Support our work! https://t.co/ZTrAThrSS1
2K Followers 548 Following#Demoscener
#VJ Artist (DM me for your gigs ;) )
Coding shaders and other stuff on Twitch
PhD student @Inrev_Paris8
Fuck N*Ts
PP by @PainPerdu8bit
They/She
40K Followers 328 FollowingI built a C library that lets you compile 12kb static binaries that run natively on Linux, Mac, Windows, FreeBSD, OpenBSD, NetBSD and BIOS using just GCC/Clang.
172K Followers 1K FollowingDirector of Cybersecurity @EFF / Co-founder of @stopstalkerware/ My tweets are my own, not my employers’ / I did a TED talk once /
549 Followers 788 FollowingFirmware security nerd. I fix things that you break. He/him.
Mastodon: @[email protected]
Tweets are my own and do not represent my employer.
7K Followers 259 FollowingSecurity researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.
3K Followers 22 FollowingBarbhack is a cybersecurity conference in south of France. Cybersecurity, Hacking spirit, networking and ... BBQ!! Let's grill some cybersec! #barbhack25
8K Followers 594 Followinghe/him 🌞: Senior Director, Simulation. 🌚: Photography & Creative coding. Blog: c0de517e. My opinions are not my own. I DON'T tweet about ROBLOX.