Muirey03 Profile Banner
Muirey03 Profile
Muirey03

@Muirey03

Followers
7K
Following
2K
Media
69
Statuses
4K

Breaking your software | iOS Researcher @Cellebrite

Joined February 2017
Don't wanna be here? Send us removal request.
@CorelliumHQ
Corellium
24 days
We have some exciting news – Corellium is now officially part of Cellebrite! Welcome to a new era for mobile security research and testing. We can’t wait to show you what the future holds as a Cellebrite company! Read the press release to learn more ⬇️
20
20
120
@alfiecg_dev
Alfie
5 months
I’m thrilled to announce that I will be joining @CellebriteLabs next month, kickstarting my career as a full-time iOS researcher. I hope to wrap up some final projects and release them in the coming weeks, but most of my public work will stop after this - it’s been a blast! 🚀💯
49
17
346
@BookCameo
Cameo
6 days
Sleigh the season with the most personal gift around. Get them a Cameo video!
22
23
218
@alfiecg_dev
Alfie
5 months
Just released a short writeup for the A9 version of the Trigon exploit, which involves getting code execution on a coprocessor before exploiting the kernel - enjoy!
alfiecg.uk
Where did we leave off? Background: KTRR IORVBAR Coprocessors Always-On Processor Investigation AXI? What’s that?! Mapping DRAM Code execution Improving the strategy What about A7 and A8(X)? Conclu...
4
36
170
@alexjplaskett
Alex Plaskett
1 year
SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon https://t.co/Ruei4EIr0H
0
26
96
@premium
Premium
5 months
Why guess when you can know?
0
821
10K
@Pokemon
Pokémon @ Lumiose City 🥐
1 year
Pokémon × @aardman Coming in 2027!
330
4K
25K
@CellebriteLabs
Cellebrite Labs
1 year
Our global research team is on its way home from Paris, marking the official close of Hexacon! If you missed how our work saves lives or want to explore the challenges we tackle, check this page and feel free to reach out: https://t.co/szUjCuE5dl Until next time, Cellebrite Labs
1
8
42
@naehrdine
Jiska
1 year
CellGuard goes public! 📶 Check if your iPhone was close to potentially malicious cellular base stations, even on non-jailbroken devices.
@lukasarnld
Lukas Arnold
1 year
Our paper about the initial research conducted with CellGuard, iOS tooling for Qualcomm basebands, and Apple Location Services has been accpeted for @RAID_Conference. Read a preprint at https://t.co/5JY3KPQBoq https://t.co/HjDnM1qYD9
4
52
195
@nooffense_il
NoOFFENSE
1 year
👋👋
0
12
29
@blacktop__
Blacktop
1 year
Today I'm very excited to get to introduce to you the newest `ipsw` feature:  🎉 Kernel Symbolication 🎉 https://t.co/BgzX2UHVFS
8
20
134
@jonpalmisc
jonpalmisc
1 year
🧵 Saturday reversing thread: I was going to wait until the full release, but since the beta seems to have become more-public-than-intended, let’s look at how the official “IDA as a library” works in IDA Pro 9.0…
1
20
101
@guyru_
guyru
1 year
According to @washingtonpost, @CellebriteLabs' VR teams are doing some incredible stuff. If you are looking to make a positive impact with your VR skills, we're recruiting for remote positions. https://t.co/O4bP2lwC4l
Tweet card summary image
cellebrite.com
Company Overview: Cellebrite’s (Nasdaq: CLBT) mission is to enable its global customers to protect and save lives by enhancing digital investigations and intelligence gathering to accelerate justice...
@washingtonpost
The Washington Post
1 year
New phone-cracking technology was used to access the phone of the Trump rally gunman, according to people familiar with the investigation who described the ongoing race to find any clues to the 20-year-old’s motive for trying to kill the former president.
2
9
25
@Muirey03
Muirey03
1 year
0x41con was a blast again! Huge thanks to @xerub for organising the most legit con around
0
0
13
@0x41con
0x41con
1 year
1
24
133
@0x41con
0x41con
1 year
Final lineup and schedule is published. See you in 2 days! 😎
0
9
39
@LIJI32
Lior Halphon 🇮🇱
2 years
Something cool I did at work – I updated our SandBlaster fork to support decompilation of sandbox profiles to compilable C code. The C code can then be compiled and decompiled using HexRays or your favorite decompiler to get readable output. Sandbox reversing just became easy!
@CellebriteLabs
Cellebrite Labs
2 years
Thrilling update! We've transitioned from Lisp to C for decompiling sandbox profiles, enhancing both accuracy and readability. Our SandBlaster fork also improves iOS 17 support. A big shout-out to @yarden_ha and @LIJI32 for their contributions! https://t.co/sgURRpSZEF
4
11
69
@CellebriteLabs
Cellebrite Labs
2 years
👋
2
3
14
Dopamine 2.0 is officially out. Supports 15.0 - 16.6.1, arm64 (A9+ for now) 15.0 - 16.5.1, A12 - A14 15.0 - 16.5, A15 - A16 Release post: https://t.co/f2ktyEvJVc
Tweet card summary image
reddit.com
Explore this post and more from the jailbreak community
474
414
2K