codecolorist@infosec.exchange

@CodeColorist

가입일 Mart 2012
1.1K 팔로잉5.6K 팔로워
codecolorist@infosec.exchange
[email protected]@CodeColorist·
It's supposed to be deperecated, but just updated and published bagbak@5 for frida@17 github.com/ChiChou/bagbak - New approach for decrypting Extension process with better stability - Removed SSH / scp infavor of on-device Zip compression and frida-only transmission, much faster
codecolorist@infosec.exchange tweet media
English
0
7
40
3.7K
codecolorist@infosec.exchange
[email protected]@CodeColorist·
no need for command line dump now
English
0
5
45
4.7K
codecolorist@infosec.exchange
[email protected]@CodeColorist·
Frida Workbench for VSCode v0.11.5 marketplace.visualstudio.com/items?itemName… - Enhanced auto complete for classes and methods, both Java and ObjC - Explore classses and modules, generate hook template directly Reposting because of a critical bug between 0.11.0-0.11.4, do not use them
codecolorist@infosec.exchange tweet mediacodecolorist@infosec.exchange tweet mediacodecolorist@infosec.exchange tweet media
English
0
11
47
4K
codecolorist@infosec.exchange
[email protected]@CodeColorist·
@arekfurt No this is a platform specific IPC, not related to network traffic at all
English
1
0
1
534
Brian in Pittsburgh
Brian in Pittsburgh@arekfurt·
The general idea here.... How many times have you been using Wireshark and wished that you could easily see what was actually generating/responding to the network traffic on the host? (For me, I think it's pretty much every time I've used Wireshark.)
English
3
5
24
4.7K
codecolorist@infosec.exchange
[email protected]@CodeColorist·
@patrickwardle By the time of writing that tweet (was 6 years ago 😅), it used unexported symbol from libobjc. There are 2 undocumented, but higher level APIs available
codecolorist@infosec.exchange tweet media
English
0
0
4
342
Patrick Wardle
Patrick Wardle@patrickwardle·
Indeed 😅 ...but lots of time till the #OBTS v9 CFP opens
Patrick Wardle tweet media
English
2
0
12
5.2K
Michael
Michael@MasterMike88·
@CodeColorist @SecLists this individual is literally the definition of blatant AI slop and paranoia and it's not close
English
2
0
1
842
codecolorist@infosec.exchange
[email protected]@CodeColorist·
Security folks, please be aware of this Joseph Goydish II (jgoyd) account on GitHub. Everything is llm made up misinformation garbage. He actively promotes his own links to @SecLists for engagement farming. He used to have Reddit account and substack blog, but somehow deleted
codecolorist@infosec.exchange tweet mediacodecolorist@infosec.exchange tweet mediacodecolorist@infosec.exchange tweet mediacodecolorist@infosec.exchange tweet media
English
7
6
65
11.5K
JGii
JGii@atlien404770·
@CodeColorist @SecLists So US Cert takes in vulnerability reports, reviews them, then opens a cases for issues that are not real? This logic is flawed.
English
1
0
0
230
JGii
JGii@atlien404770·
@CodeColorist @SecLists Getting an automated reply from Apple and an invitation to participate in vulnerability disclosure from US CERT, are 2 completely different things.
English
2
0
0
292
codecolorist@infosec.exchange
[email protected]@CodeColorist·
After his reaction I feel relieved because it’s more likely delusion instead of state hackers that I should fear
English
0
0
5
1.8K
codecolorist@infosec.exchange
[email protected]@CodeColorist·
@SecLists Taking down the replies I sent to that guy now in case I got poisoned somewhere one day
English
0
0
0
1.6K