Ai000 Cybernetics QLab

28 posts

Ai000 Cybernetics QLab banner
Ai000 Cybernetics QLab

Ai000 Cybernetics QLab

@aioooir

Ai000 Cybernetic QLab is a little company with a focus on low-level system security, secure communication, and defend against bad minds.

Tehran Katılım Kasım 2023
182 Takip Edilen20 Takipçiler
JP Aumasson
JP Aumasson@veorq·
viXra material; we told you to stop using RSA years ago
JP Aumasson tweet media
English
85
298
3K
353.1K
Bayt Al Fann
Bayt Al Fann@BaytAlFann·
Ever wondered who invented robotics? Ismail al-Jazari, a Muslim inventor from the 12th century is known as the "father of robotics" due to his groundbreaking work in the field of automata, which are self-operating machines. A thread on Ismail al-Jazari, engineering & robotics…
Bayt Al Fann tweet media
English
81
1.5K
6.3K
376.1K
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
📌طراحی یک سامانه Windowing برای لینوکس از صفر. در این پست دربارع چالش‌های طراحی رابط‌های گرافیکی در لینوکس صحبت شده است. در تلگرام @aioooir بخوانید.
فارسی
0
0
1
102
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
📌لینوکس بهتر است یا ویندوز، آخر سر حق با کیست؟ مقاله را در کانال تلگرامی @aioooir بخوانید.
فارسی
0
0
1
87
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
📌نظارت بر روی تراکنش‌های بلاکچین و شناسایی فعالیت‌های مجرمانه و غیرقانونی، نگاهی فنی به داستان @nobitexmarket. مقاله را در کانال تلگرام @aioooir بخوانید.
فارسی
0
0
1
72
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
I am working on the second series of the system thinking and standard system analysis approach. In this article, We have focus on c based software system decomposition and synthesis concepts. #aiooo #binary
English
0
0
1
95
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
In this research paper, the first part of the system analysis series, our team at ACQL has embarked on an exploratory journey to thoroughly understand general systems concepts, aiming to extrapolate these concepts to broader system typologies. read here acql.ir
Ai000 Cybernetics QLab tweet media
English
0
1
6
500
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
One of the most interesting challenges for me is to write an exploit for a media player which is player continues its work after the exploit embedded into the file is triggered. Do you think this can be done? #exploit #fileformat
English
0
0
3
121
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
In addition to being used with a focus on malware analysis, this research will even be used in some exploit development scenarios. These articles will be published only among members and students of Ai000 Cybernetic QLab.
English
0
0
2
87
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
and even process-based sandboxes such as Sandboxie, to extract their architecture, analytical algorithms, etc ... until he can get to know the bottlenecks of these software solutions.
English
1
0
2
66
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
One of the important stages of malware analysis is the use of automatic software solutions to analyze the PE/ELF binary behavior in Runtime and then check their operational side-effects on disk, memory, OS and network.
Ai000 Cybernetics QLab tweet media
English
1
0
3
121
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
In the next steps, manual testing or fuzzing will be done based on the type of components Mehdi will reach in the vulnerability-hunting stage. However, the first part of Mehdi's video is available on YouTube.
English
0
0
2
56
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
Therefore, in this course, Mehdi Karzari went to the Rubika android application to reach the recognition stage as much as possible by examining the subsystems of this software.
English
1
0
2
54
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
In addition to examining their components DFD and extracting algorithms, we can identify their Point of Failure, then implement a Test Case or POC to prove it, and report it after it is really determined as a vulnerable system.
English
1
0
2
50
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
In the continuation of the system security and binary analysis course, we will go to test some applications, including Rubika, Telegram, Wiz, and Skype.
English
1
0
2
59
Ai000 Cybernetics QLab
Ai000 Cybernetics QLab@aioooir·
One of the important steps before any kind of work in penetration testing of software systems is to obtain intelligence. Before anything can be done, as much intelligence as possible must be obtained.
Ai000 Cybernetics QLab tweet media
English
1
0
4
59