Boris Batteux Profile
Boris Batteux

@BorisBatteux

Followers
117
Following
202
Media
0
Statuses
64

Joined May 2013
Don't wanna be here? Send us removal request.
@Guardsquare
Guardsquare
2 years
Did you know that Google Play Store is the most popular channel for threat actors to distribute #malware to target mobile banking apps? Learn more here: https://t.co/p9HQ1Fw7iq #FinTech #Android #AppSec
Tweet card summary image
guardsquare.com
In this research report, we describe how malware is typically distributed and describe the observed attack methods and behavior patterns.
0
2
2
@janseredynski
Jan Seredyński
2 years
SQL Injection is still present in 2023 on mobile platforms 📱. If you think iOS is more secure than Android because it’s difficult to misconfigure, this article will change your mind! Happy to share my very first CVE-2023-41387. #MobileSecurity #flutter https://t.co/4dNWJdsHe6
Tweet card summary image
seredynski.com
SQL Injection and app Misconfiguration are big a threat in mobile app landscape. Here is a story of One Flutter package that made Thousands apps vulnerables.
0
4
20
@thalium_team
Thalium Team
3 years
In our latest blog post, we delve into some intricacies of the Android permission system. Check out how we pushed the boundaries of custom permissions and unveiled CVE-2023-20947 by harnessing a solver approach! 🔓 https://t.co/dOromiFfhE
blog.thalium.re
The Android permission management system has already suffered from several vulnerabilities in the past. Such weaknesses can grant dangerous permissions to a malevolent application, an example being...
0
36
82
@Guardsquare
Guardsquare
3 years
The Accessibility Service on Android is an impactful feature for people with disabilities. However, it also comes with security risks. Here, you can learn how to protect against them: https://t.co/1EbcSnOUcY #MobileAppSecurity #Accessibility #CyberSecurity
0
2
2
@Blips_and_Chitz
BlipsAndChitz🚀
3 years
I've ported SiMBA (MBA Simplification Tool) to C/C++, added enhancements, multithreading support and boosted the performance 🚀🚀🚀 ( https://t.co/akR8RA5zXX)
2
13
39
@BorisBatteux
Boris Batteux
3 years
Really cool to see this integrated IDA. Performances are awesome!
@HexRaysSA
Hex-Rays SA
3 years
Our new decompiler plugin is now available! gooMBA is here to help when you’re struggling with a ‘'mixed boolean arithmetic”-obfuscated binary. Read more 🌐 https://t.co/4hEfOZjbei #HexRays #HexRaysDecompiler #IDAPro
1
0
1
@HexRaysSA
Hex-Rays SA
3 years
Our new decompiler plugin is now available! gooMBA is here to help when you’re struggling with a ‘'mixed boolean arithmetic”-obfuscated binary. Read more 🌐 https://t.co/4hEfOZjbei #HexRays #HexRaysDecompiler #IDAPro
3
62
147
@HexRaysSA
Hex-Rays SA
3 years
We’ve just published a new Plugin Focus blog post! Joxean Koret (@matalaz) from Activision introduces his binary diffing plugin #Diaphora. Read more: https://t.co/XaA80cC4IJ #PluginFocus #IDAPro #IDAPython #IDAPlugin
1
31
74
@HexRaysSA
Hex-Rays SA
3 years
Another great Plugin Focus blog post is out! Marc-Étienne Léveillé introduces the IPyIDA plugin. Learn how this IDA add-on makes prototyping and Python plugin and script development friendlier 🌐 https://t.co/625Kw4ricN #PluginFocus #IDAPro #IDAPython #IDAPlugin
0
15
58
@0xor0ne
0xor0ne
3 years
Great post by @vinopaljiri about techniques for invoking functions directly from assembly: IDA Appcall, Dumpulator and Unicorn Engine https://t.co/asV8nqxUcM #reverseengineering #malwareanalysis #informationsecurity #cybersecurity #assembly
0
53
209
@HexRaysSA
Hex-Rays SA
3 years
IDA handles direct calls and adds cross-references automatically. What could you do when you are dealing with indirect calls? Check how to set callee addresses manually 🌐 https://t.co/zxZlcqueiv #IgorsTipOfTheWeek #IDAtips #IDAPro #IndirectCalls
0
4
21
@notareverser
French
3 years
Time for a brief thread on one of @HexRaysSA most powerful classes provided as part of their IDA Python API The humble insn_t class Understanding this type will help you in all sorts of ways, including my favorite, generating YARA signatures Let's begin...
1
17
40
@0xabc0
Ahmet Bilal Can 🦔
3 years
Lets goo. Made some additions to https://t.co/ebe1NiBY5l and voila🥳 Finally a good blog post subject + will be explaining some ida internal errors I encounter while playing with hexray microcode api👽Blog post soon🤠
2
14
55
@Guardsquare
Guardsquare
3 years
In the final blog of our Flutter app reverse engineering series, we look at how classical attacks apply to Flutter apps. Follow along as we investigate using techniques like code patching and hooking for cheating: https://t.co/ksODLAa8qj #reverseengineering #Flutter #FlutterDev
Tweet card summary image
guardsquare.com
Are the classical attacks that we see on mobile applications applicable to Flutter apps? Learn more about flutter app security and Frida Flutter.
0
8
17
@Guardsquare
Guardsquare
3 years
TrollStore, a new iOS tool, prompts developers to rethink their #MobileAppSec as they can no longer rely on #Jailbreak or repackaging detection to stop modded #iOS apps. See how #TrollStore is impacting the industry. https://t.co/ahnVX5O2W3 #iOSDev
Tweet card summary image
guardsquare.com
TrollStore is an iOS tool that enables users to install modded apps onto non-jailbroken devices. Learn more about TrollStore safety and mitigations.
0
2
8
@citronneur
Sylvain Peyrefitte
3 years
The results are out! We are very honoured to have won first place🥇in the Hex-Rays plugin contest 2022 🎉 Our entry was "ttddbg", a time-travel debugging plugin for IDA already presented at #SSTIC 2022. Many congratulations to all the other entrants!
@HexRaysSA
Hex-Rays SA
3 years
🥁 We have the winners of the Hex-Rays Plugin Contest 2022! Our congratulations go to: 🥇 ttddbg by @simsor and @citronneur 🥈 ida_kcpp by Uriel Malin and Ievgen Solodovnykov 🥉 FindFunc by Felix B. Take a look at the full list: https://t.co/Zu7idO5E8F #PluginContest #IDA
6
21
62
@ptswarm
PT SWARM
3 years
📝New research by @lmpact_l: "Fork Bomb for Flutter" There are more and more Flutter applications, and security analysis of these apps is in high demand. Our member Phil shares his knowledge and presents his reFlutter tool. Read the article:
Tweet card summary image
swarm.ptsecurity.com
Flutter applications can be found in security analysis projects or bugbounty programs. Most often, such assets are simply overlooked due to the lack of methodologies and ways to reverse engineer...
6
27
75
@eshard
eShard
3 years
We investigate a bootloader on the #android13 update that increments an anti-roll back version and might put the users of Google Pixel 6 at risk. https://t.co/IWcqybiQrW
1
11
34
@MiscMisty
Misty
3 years
An IDA helper script to draw outlined func graphs: https://t.co/qLKGRodOZ8
2
72
256