Coldzer0

67 posts

Coldzer0 banner
Coldzer0

Coldzer0

@Coldzer0x0

Senior Offensive security engineer @EG_CERT | { Opinions are my own } Offensive Tools Developer, Malware Analyst, Reverse Engineer 🦠

Coldzer0#0000 Katılım Mart 2013
385 Takip Edilen1.1K Takipçiler
Coldzer0 retweetledi
rev.ng
rev.ng@_revng·
🎥 QEMU Dev Starter guide, Part 1 The QEMU codebase can be quite daunting for new developers, Anton with this talk aims to give an overview of both the major APIs one might encounter as well as the high control flow of user-mode emulation.
English
2
66
343
20.8K
Coldzer0 retweetledi
diversenok
diversenok@diversenok_zero·
I wanted to understand what information is available in .pdb files, so I made a tool for it 🔎🪲 Welcome DiaSymbolView - a debug symbol hierarchy and properties viewer based on MSDIA: github.com/diversenok/Dia…
diversenok tweet media
English
3
58
187
14.9K
Coldzer0 retweetledi
Tim Blazytko
Tim Blazytko@mr_phrazer·
We at @emproofsecurity open-sourced a free firmware reverse engineering workshop for self-study. Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included. github.com/emproof-com/wo…
English
0
84
318
20.5K
Coldzer0 retweetledi
Jonathan Blow
Jonathan Blow@Jonathan_Blow·
"Here's a link to my github so you can see what kind of programmer I am" seldom fails...
Jonathan Blow tweet mediaJonathan Blow tweet media
English
59
12
691
91.7K
Coldzer0 retweetledi
ö
ö@r0keb·
Good Morning! Just published a blog post analyzing Hyper-V functionality, design, and key binaries, hvix64.exe (hypervisor), securekernel.exe (secure kernel), and winload.dll (boot-time loader and CPU check). r0keb.github.io/posts/Hyper-V-…
English
5
85
282
17.7K
Coldzer0 retweetledi
x64dbg
x64dbg@x64dbg·
We're excited to announce a major new release of x64dbg! The main new feature is support for bitfields, enums and anonymous types, which allows all types in the Windows SDK to be represented and displayed 🔥
English
12
261
1.4K
76.1K
Coldzer0 retweetledi
João Vitor(Keowu)
João Vitor(Keowu)@keowu·
My new article, "Writing a Full Windows ARM64 Debugger for Reverse Engineering," covers the topic in detail, including its internals and the core differences between Windows on Intel and ARM64: keowu.re/posts/Writing-…
English
4
83
264
22.9K
Coldzer0 retweetledi
Dylan Tran
Dylan Tran@d_tranman·
Had a lot of fun digging into COM stuff with @bohops recently! We ended up finding a way to laterally move without dropping a file. ibm.com/think/news/fil…
English
12
177
526
76.1K
Coldzer0 retweetledi
Hiroshi Suzuki
Hiroshi Suzuki@herosi_t·
I updated PyClassInformer to add several new features such as auto-renaming virtual methods, detecting user-defined classes, detecting possible constructors and destructors, tree-based widget to display class-related information and so on. github.com/herosi/PyClass…
Hiroshi Suzuki tweet mediaHiroshi Suzuki tweet mediaHiroshi Suzuki tweet media
Hiroshi Suzuki@herosi_t

I've released a new tool "PyClassInformer". It detects vftables in a program compiled with MSVC++ by parsing RTTI. It is written in pure python. So, it runs on MacOS and Linux as well as Windows. #cpp, #vftable, #RTTI, #IDA, #IDAPython, #ReverseEngineering github.com/herosi/PyClass…

English
1
28
96
17K
Coldzer0 retweetledi
Pavel
Pavel@sadreck·
Codecepticon v1.1.0 just released! You can now: 👉Generate certificates and... 👉...sign executables, in order to... 👉...bypass even more AVs with one simple trick! github.com/Accenture/Code…
English
1
53
135
14K
Paul L.
Paul L.@am0nsec·
Every year we should have a contest of the most unmaintainable and unbuildable from source open source projects.
English
3
0
17
0
Coldzer0
Coldzer0@Coldzer0x0·
Just pushed the server code (a lot of Bugs) :V
Coldzer0 tweet media
English
0
0
2
0