eShard

992 posts

eShard banner
eShard

eShard

@eshard

Beyond testing tools, solutions that deliver expertise. 🌐 Chip & binary security testing https://t.co/1dUvkjLR8L https://t.co/BCMLXCF49H

Katılım Temmuz 2015
335 Takip Edilen1.8K Takipçiler
eShard
eShard@eshard·
We're at @offensive_con 🏴‍☠️ in Berlin! We're doing demos of our Time Travel Debugging tool, so stop by our booth to catch some "bugs" 👀
eShard tweet mediaeShard tweet media
English
0
0
5
311
eShard
eShard@eshard·
Missing peripheral in QEMU? Adding it yourself is easier than you think. We hit a wall analyzing CVE-2019-14192 on real @Raspberry_Pi 3B+ firmware, so we added the missing driver to #QEMU. Register by register, using U-Boot's own source as the spec. eshard.com/blog/u-boot-cv…
English
0
9
39
1.8K
cyberai
cyberai@CyberaiBrief·
@eshard From one CPU trace to full exploit chain is wild. Debugging just got teeth.
English
1
0
1
5
eShard
eShard@eshard·
A malicious MKV opens in VLC. A fake calc.exe pops up: "We've got you." An AI agent made an MCP trace-driven analysis and reconstructed the full exploit chain, use-after-free, heap spray, ROP chain, shellcode, from a single CPU trace. 🔗eshard.com/blog/vlc-media… #exploit
English
2
9
45
2.9K
eShard
eShard@eshard·
Heading to @offensive_con in Berlin next week ✈️ We'll be demoing Time Travel Debugging (TTD) through a hands-on CTF challenge. Come break things with us 😎
eShard tweet media
English
0
0
5
219
eShard
eShard@eshard·
We have a Slack! Come chat, get support for our free TTD tool, and be part of the community: u.eshard.com/slack
English
0
0
2
239
eShard
eShard@eshard·
Copyfail (CVE-2026-31431) is a new Linux kernel privilege escalation vulnerability sitting undetected since 2017, and it has been discovered using AI. We analyzed it the same way. Locally. 🔗 eshard.com/blog/copy-fail… #Linux #CVE #AI
English
0
1
5
540
eShard
eShard@eshard·
Hackers are using AI, creating a massive imbalance in the reverse engineering world. Because unlike hackers, security analysts can't be careless when using LLMs, so we fall behind. ↗ Here is how to level the playing field safely: eshard.com/blog/hackers-a… #reverseengineering
English
0
1
0
132
eShard
eShard@eshard·
Join us at @Typhooncon in Seoul for a training on Android Binder internals. We’ll guide you through the complexities of low-level component exploitation, moving from root-cause analysis to a reliable proof-of-concept. 🔗 Register here: eventbrite.com/e/196856163985…
eShard tweet media
English
1
0
6
692