
vient
@_vient_
Followers
232
Following
2K
Media
11
Statuses
177
Reverse Engineer | C/C++ Developer | Bushwhackers CTF team
Cyberspace
Joined September 2012
RT @kyprizel: Yandex School of Information Security is back:
yandex.ru
Научим делать безопасные продукты и системы. Программа школы рассчитана на два месяца. Расписание построено так, что занятия можно совмещать с работой или учёбой.
0
4
0
Only problem is that you still need to set proper refs in `emu` (I expected that IDA will perform `emu` by itself since we set known ID, maybe there is somehting missing in my code). My script (part) from ctf:
gist.github.com
IDA processor extension plugin for "patching" purposes - 0ctf_plugin.py
1
0
0
Made a context menu launcher for IDA which automatically chooses 32 or 64-bit version based on `file` output run in WSL: Usage: right click on file, Open with IDA. Set your IDA_DIR env or change it in ida_launcher.bat.
gist.github.com
Add IDA to context menu. Download as ZIP, unpack to safe place (don't delete after!) and run setup.bat. You will get "Open with IDA" in context menu. Requires WSL installe...
2
1
2
RT @solardiz: Memory corruption vulnerabilities in VNC protocol implementations, research by @__paulch: https://t.c….
0
20
0
RT @VDashchenko: Kaspersky ICS CERT invites you to join the IoT Vulnerability Research and Exploitation Training at Security Analyst Summit….
0
7
0
RT @nneonneo: Just published my writeup for CPU Adventure at DSCTF, wherein me, @zwad3, @thebluepichu and @jay_f0xtr0t reverse engineered….
robertxiao.ca
or: reverse-engineering a custom, unknown CPU from a single programtl;dr: We reverse-engineered a program written for a completely custom, unknown CPU architecture, without any documentation for th…
0
81
0