Tweets from May 2014

RT @timstrazz: #Android Hacker Protection Level 0 at Defcon 101 - don't miss it. Free 0days courtesy @TeamAndIRC http://t.co/iaQj0KxarN

7:56am May 30th 2014 via Falcon Pro

RT @oleavr: Frida 1.6.0 is out: Spy on any Android app with brand new Dalvik integration http://t.co/QnClVuAGhq

7:51am May 30th 2014 via Falcon Pro

RT @timbray: A significant update from Keybase, which is trying to be a service you can use without trusting: https://t.co/NCI0TlILas

7:46am May 30th 2014 via Falcon Pro

RT @opersys: "Android's system calls" blog post: http://t.co/rzUAw8PSPh

7:42am May 30th 2014 via Falcon Pro

@timstrazz meh, i could have guessed that! Android what else? :)

9:16pm May 29th 2014 via Falcon Pro in reply to timstrazz

RT @collinrm: Mobile Security News Update May 2014 http://t.co/TD8R1fsGdQ - many interesting mobile talks at @BlackHatEvents MDM stuff looks interesting

9:09pm May 29th 2014 via Falcon Pro

RT @angryflatcap: Facebook want me to install their new Messenger app, but it's a bit intrusive. http://t.co/bLtLjJF3DK

9:02pm May 29th 2014 via Falcon Pro

@timstrazz congrats! what is it about? :)

8:46pm May 29th 2014 via Falcon Pro in reply to timstrazz

RT @HITBSecConf: #HITB2014AMS D1 SLIDES: D1T2 - State of the ART: Exploring the New Android KitKat Runtime - http://t.co/csKZtmO9i5

8:33pm May 29th 2014 via Falcon Pro

RT @corelanc0d3r: HITB2014AMS – Day 1 – State of the ART: Exploring the New Android KitKat Runtime http://t.co/VjUtLNZrei

8:33pm May 29th 2014 via Falcon Pro

A modern Linux traffic shaping script using fq_codel - https://t.co/9FW5pEy2bM

7:14pm May 29th 2014 via web

nice read on Linux traffic shaping: Wondershaper Must Die - http://t.co/3IICqDiRJM

6:47pm May 29th 2014 via web

RT @NCCGroupInfosec: NCC Labs Beta: Heartbleed bin analyzer for statically linked libs or dynamic libs with no ver info https://t.co/bQk0W7S3A1 (ARM, X86, X64)

6:25pm May 29th 2014 via Falcon Pro

RT @Technologeeks: Slides on Linux & Android Debugging native debugging techniques from Jonathan Levin's #Andevcon Boston talk: http://t.co/ivPdkiBtoX

7:37am May 29th 2014 via Falcon Pro

RT @kapitanpetko: The security chapter of 'Android Internals: A Confectioner's Cookbook' is now available for free download: http://t.co/FBF0GJRPQg

7:37am May 29th 2014 via Falcon Pro

RT @0xroot: Live Memory Forensics on Android with Volatility - An interesting analysis of the Android DalvikVM - https://t.co/dTFGEKSWQo

7:27am May 29th 2014 via Falcon Pro

RT @timstrazz: Why does the emulator always have 'ARGH' set? Well.. Look for it if you want to know you're being emulated… http://t.co/cnxXXLqKqE

8:11am May 28th 2014 via Falcon Pro

RT @SFAFofficial: IT IS HERE! All episodes of "Street Figher: Assassin's Fist" available on @Machinima right now! キター!全話配信開始しました!

10:00pm May 27th 2014 via Falcon Pro

@s7ephen what app do you use to make those framed pictures?

6:50pm May 27th 2014 via Falcon Pro in reply to s7ephen

RT @0xroot: Burp protobuf decoder extension - https://t.co/dsopOnTblk

6:46pm May 27th 2014 via Falcon Pro

RT @jmichel_p: New blog post finished: From NAND chip to files. http://t.co/gS6eliCgGv Almost a step-by-step guide :) #DFIR #UBIFS #chipoff

6:38pm May 27th 2014 via Falcon Pro

RT @BlackHatEvents: Jeff Forristal exposes a vulnerability embedded in all shipped Android devices since January 2010--#BHUSA Briefing http://t.co/2efNI7vNZx

8:04am May 27th 2014 via Falcon Pro

RT @phoronix: Apple Thunderbolt Driver Might Be Added To Linux 3.16 Kernel: An open-source Thunderbolt driver for supporting... http://t.co/Wgd4dXbQAz

7:48am May 27th 2014 via Falcon Pro

RT @opersys: Introducing our "AOSP Debugging and Performance Analysis" class: http://t.co/LxRwxGvUQW - all courseware CC-BY-SA.

7:44am May 27th 2014 via Falcon Pro

RT @angealbertini: Zeptobars is offering free decapping service for reversing http://t.co/UiqL9soQga http://t.co/eZBMNykr54

9:27pm May 26th 2014 via Falcon Pro

RT @esizkur: The Chrome bugtracker continues to be a trove for ARM CPU errata: http://t.co/8nuN2bfVJ0 (NEON issue on r0 MSM8960 apparently, HT @agl__)

9:21pm May 26th 2014 via Falcon Pro

RT @AndroidTamer: Android apps can take photos with your phone without you knowing : http://t.co/haCGIyD1e6

6:35pm May 25th 2014 via Falcon Pro

RT @manisha72617183: Good map of #Linux performance observability tools by @brendangregg...info & link http://t.co/LKpFrvQmom @MrsYisWhy http://t.co/1k0ccEF

6:31pm May 25th 2014 via Falcon Pro

RT @carlosacastillo: Host-based Card Emulation (Android 4.4) vs Embedded Secure Element http://t.co/PBGYu4lY58 by @randomoracle - Comparison from a security POV

5:34pm May 25th 2014 via Falcon Pro

RT @revskills: Quick and easy terminal sharing https://t.co/hl4jwUyrpn

3:46pm May 23rd 2014 via Falcon Pro

RT @AndroidTamer: Exploit Apps with JDB http://t.co/64O2IQxn87 written using @AndroidTamer another good article by @srini0x00

1:04pm May 23rd 2014 via Falcon Pro

RT @cryptax: Our slides at #CARO 2014 are available here : http://t.co/rEQwpc9ry0 #Android #obfuscation #packer (cc: @_r04ch_ )

12:54pm May 23rd 2014 via Falcon Pro

RT @TeamAndIRC: A whole mess of EMMC and JTAG pin outs for mobile (mostly android) https://t.co/vMbnTQFzcr anyone know the origin?

10:26pm May 22nd 2014 via Falcon Pro

RT @TeamAndIRC: @Fuzion24 CVE-2014-3847 for HTC WeakSauce

10:24pm May 22nd 2014 via Falcon Pro

Google Apps Mobile Management for Android can now detect & remotely wipe a rooted device - http://t.co/XWSwqUz8j3

10:09pm May 21st 2014 via Falcon Pro

RT @semibogan: PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices http://t.co/5lg2o7nYAk #WTF

10:00pm May 21st 2014 via Falcon Pro

RT @djrbliss: Props to @5aelo for noticing CVE-2014-0196 doesn't affect kernels between commits c56a00 and 64325a. Galaxy S5 is not vuln as a result.

12:55pm May 21st 2014 via Falcon Pro

RT @it4sec: [PDF] "Bypassing SSL Pinning on Android via Reverse Engineering" http://t.co/Afo9oQoRRb

2:01pm May 20th 2014 via Falcon Pro

RT @thedarktangent: RT @beist: i'm happy that 2 teams from BoB got the qual of Defcon CTF. <- Congrats Professor!

6:33am May 20th 2014 via Falcon Pro

RT @BlackHatEvents: Tackle Android Device Security with assistance from a Droid Army in @jduck presentation at #BHUSA Briefings http://t.co/kF2VXq5WLK

3:13am May 20th 2014 via Falcon Pro

RT @viaforensics: viaLab 2.7 now available! New features include Heartbleed checks, vuln pinpointing & more. https://t.co/MWumuT8UaX http://t.co/hi7N4S8JMu

10:12pm May 19th 2014 via Falcon Pro

RT @aseemjakhar: Just released Indroid - Thread injection kit for ARM/Android. Feedback/testing results welcome - https://t.co/xbVwAPeDOF

5:13pm May 19th 2014 via Falcon Pro

@angel_killah hey! still working on it :) was nice meeting an infosec guy at stunfest, i didn't imagine i'd find one there :D

1:19pm May 19th 2014 via Falcon Pro in reply to angel_killah

RT @ChainfireXDA: SuperSU: more root breakage for the next Android version - https://t.co/fORMgiZlyT - devs must read - please retweet!

8:44pm May 18th 2014 via Falcon Pro

RT @attrc: Holger's new paper on Android / Dalvik Memory Forensics: https://t.co/5LIVDym4Bx #DFIR

5:54pm May 18th 2014 via Falcon Pro

RT @thuxnder: Reading Android system properties from within an App without using getprop cmd. https://t.co/kLNo3SXBSv

8:06am May 18th 2014 via Falcon Pro

Xposed Bridge API add-on for Android SDK - http://t.co/MscEXB4FHD useful to compile Xposed addons using ant, without Eclipse

12:24pm May 17th 2014 via web

RT @AndroidPolice: Google Has Quietly Implemented Automated Refunds For Apps After The 15 Minute Window http://t.co/8SliAsZOaN

6:28am May 17th 2014 via Falcon Pro

RT @toorcamp: Learn to Hack Android Apps with Dynamic Instrumentation with Collin Mulliner at http://t.co/m4giSRreAn July 9th-13th

4:13pm May 16th 2014 via Falcon Pro

RT @kutyacica: Signalling Storms in 3G networks http://t.co/NtEDQGWnE2 warning: heavy on math! :) But interesting, especially from a carrier perspective.

9:53am May 16th 2014 via Falcon Pro

RT @AndroidPolice: Play Store Now Accepts PayPal In 12 Countries, Carrier Billing, Gift Cards, And Developer Sales Countries... http://t.co/v0oRn6Z1Dd

1:02am May 16th 2014 via Falcon Pro

RT @txs: If you have implemented or are an end user of mobile application wrapping or containerization technologies READ THIS: http://t.co/MpzbzipFri

6:24pm May 15th 2014 via Falcon Pro

RT @djrbliss: Watching XDA work on the PTY vuln is like watching a high school physics class try to build a nuclear reactor out of sticks and twine.

5:15pm May 15th 2014 via Falcon Pro

RT @cryptax: Another Android packer : https://t.co/4UqsaGN7gZ (in Chinese)

4:48pm May 15th 2014 via Falcon Pro

RT @hdmoore: A table of direct links for password changes & two-factor authentication setup: http://t.co/75TV4XxNSG

9:52pm May 14th 2014 via Falcon Pro

RT @binitamshah: HoneypotLabSac - A Virtual Honeypot Framework for Android : http://t.co/VE87HZgSk5 (pdf)

9:34pm May 14th 2014 via Falcon Pro

RT @WileyTech: Security is a small but important part for creating a successful Android app @jduck @pof @quine @s7ephen @collinrm http://t.co/q9cDMeha2K

6:49pm May 14th 2014 via web

RT @thomas_cannon: @kapitanpetko lol. Also check out https://t.co/TPZXhwhx8h and @saidelike might have something better ;)

2:09pm May 14th 2014 via web

RT @kapitanpetko: Seems like PIN cracking can be made somewhat harder by writing random data to the first 1024 bytes (reserved) of the EXT4 partition.

2:09pm May 14th 2014 via web

@Xgamerz my Hawk 360 training here, getting better - http://t.co/iwxVofli5u

10:13am May 14th 2014 via web

RT @xdadevelopers: Researchers at Columbia University Bring iOS Apps to Android http://t.co/agbIbmDk1i

6:21am May 14th 2014 via Falcon Pro

RT @Thu_Duo: Security: A Feature of Your #Android Application, blog by @collinrm and @quine of @duosec! http://t.co/xegYF1qdKW #infosec

6:19am May 14th 2014 via Falcon Pro

RT @kapitanpetko: Android FDE PIN cracker from @SantokuLinux, now with scrypt (4.4) support https://t.co/MP0p7fx3wS

6:08am May 14th 2014 via web

RT @thegrugq: @pof also, the ext4fs module has been patched so that it allocates strictly linearly, which kinda sticks out if you look at a bitmap of blks

12:49pm May 13th 2014 via web

RT @thegrugq: @pof theres a full GuardianROM which is probably easier to use. It has integrated Mobiflage. (You need to reboot each time though)

12:49pm May 13th 2014 via web

RT @Gunther_AR: Wow...even Tencent got .apk Packer - http://t.co/vxTyviILji CC: @timstrazz

12:06pm May 13th 2014 via Falcon Pro

RT @jduck: I just revamped the user and group handling in canhazaxs (https://t.co/XjYzG30RfG). Also added some --help love. cc @anestisb

11:48am May 13th 2014 via Falcon Pro

mobiflage: plausible deniable storage encryption for Android devices - http://t.co/oLiAojR3pP

11:43am May 13th 2014 via web

RT @timstrazz: TIL - https://t.co/lTT57GEkyd < nice #Android logcat/stuff coloring

6:34am May 13th 2014 via Falcon Pro

RT @grsecurity: No fewer than four grsec features (UDEREF/KERNEXEC/RANDSTRUCT/HIDESYM) prevent this exploit for the pty vuln: http://t.co/FvV3IJ8VVo

10:03pm May 12th 2014 via Falcon Pro

RT @hdmoore: Google Has Most of My Email Because It Has All of Yours: http://t.co/LTfE9ofqw9

7:26am May 12th 2014 via Falcon Pro

RT @razor: Interesting insight in the 90s #scene. And also how to do a career: Preschool -> @razor 1911 -> @NASA Like a boss! http://t.co/7wpdovu5DR

10:18pm May 11th 2014 via Falcon Pro

RT @jjkakakk: … and antibes - bes android hooking, antimdm - epic hooking, unsqlcipher - xposed bes sqlcipher hook https://t.co/ZFrC8r0tMI

10:08pm May 11th 2014 via Falcon Pro

RT @jjkakakk: added some new android things to github, ajitest - android sample app for addjavascriptinterface, ajihttpd - web server for previous, and...

10:08pm May 11th 2014 via Falcon Pro

Android's C library, unchanged OpenBSD code and support for printf(3)'s %n - http://t.co/sUImfeI2H8

9:27am May 11th 2014 via Falcon Pro

@mountainmanjed any idea where to start for a cheat to make the dummy always do reversal DP after a knockdown? (training for safe jumps)

9:50pm May 10th 2014 via Falcon Pro in reply to mountainmanjed

RT @JoseSelvi: ¿Quieres aprender pentesting? SEC-560 del SANS Institute del 2 al 7 de junio en Madrid ¡Apuntate! https://t.co/P1lVZqBkTV

11:22am May 9th 2014 via web

Verified boot (dm-verity) tools for Android by @kapitanpetko - https://t.co/rPOLM7DP8s

2:33pm May 8th 2014 via web

Finally got our UD-USB Decoders (USB from X360 & PS3 controller to raw button/joystick signals)! thx @therealundamned http://t.co/whNBCWVOkm

11:28am May 8th 2014 via web

RT @Technologeeks: New Book by Jonathan Levin - "Android Internals". Details kernel, frameworks, architecture &more. June '14. FAQ/TOC @ http://t.co/fNJQUw9

7:44am May 8th 2014 via Falcon Pro

RT @kapitanpetko: Great success: # mount |grep system /dev/block/dm-0 /system ext4 ro,seclabel,relatime,data=ordered 0 0 #veirty #android

3:51pm May 7th 2014 via Falcon Pro

RT @jduck: Android Hacker's Handbook is available in several electronic forms now - http://t.co/HoA6eCoXKB

9:00pm May 6th 2014 via Falcon Pro

RT @AndroidPolice: Our New Android Build Number Date Calculator Takes The Mystery Out Of Android Build Dates http://t.co/KTX7G1LfPJ

8:50pm May 6th 2014 via Falcon Pro

RT @angealbertini: Wyvern F-0 (Xevious' rare "sequel", by Taito) is now emulated in Mame http://t.co/E5eXFNUZRY https://t.co/pwvXrel8z9

5:26pm May 6th 2014 via Falcon Pro

RT @oss_sh: json.sh - a pipeable JSON parser written in Bash https://t.co/qStf1DiTyk

5:30am May 6th 2014 via Falcon Pro

RT @Gunther_AR: AirBag: Boosting Smartphone Resistance to Malware Infection - http://t.co/8NLgucT6LR

5:13am May 6th 2014 via Falcon Pro

RT @Gunther_AR: AppSealer: Automatic Generation of Vulnerability-Patches for Preventing Component Hijacking Attacks in Android Apps - http://t.co/ByAUKpko1B

5:12am May 6th 2014 via Falcon Pro

RT @Gunther_AR: APKLancet: Tumor Payload Diagnosis and Purification for Android Applications - http://t.co/XdwxuqrZ5x CC:@timstrazz

5:03am May 6th 2014 via Falcon Pro

RT @Gunther_AR: PREC: Practical Root Exploit Containment for Android Devices - http://t.co/G6veIIc0OI

9:02pm May 5th 2014 via Falcon Pro

Frida: function tracing on your Android device - http://t.co/66LlzGSXh9

8:15am May 5th 2014 via Falcon Pro

@Mattun_Ken can you put Gian recital on twitch archive please?

3:25pm May 4th 2014 via Falcon Pro in reply to Mattun_Ken

Super Street Fighter 2X Solo - brackets #stunfest2014. Finals streamed at 16h (fr time) http://t.co/8tlwE2Dcxl

1:39pm May 4th 2014 via Falcon Pro

Super Turbo 1vs1 mirror match #stunfest2014 brackets, finals about to start http://t.co/Xsn9rN4M0T

4:47pm May 3rd 2014 via Falcon Pro

@sf2kuroppi @stunfest the '???' in the 3rd team is: solinvictus

3:21pm May 3rd 2014 via Falcon Pro in reply to sf2kuroppi

fingerprinting users through phone accelerometer patterns - http://t.co/u19PGWZGpV

6:10am May 3rd 2014 via Falcon Pro

RT @adi1391: Mobile Device Checklist - Part I for Mobile Developers and Security Professionals : http://t.co/Ut4yavjMmD

9:45pm May 2nd 2014 via Falcon Pro

RT @angelodellaera: Thug now supports APK analysis (through Androguard). Once again thanks to @adesnos https://t.co/hUBZudr5F7 #thug #honeyclient

9:23pm May 2nd 2014 via Falcon Pro

RT @romainguy: An exhaustive description of Android’s graphics architecture: http://t.co/SSASckSc3I #android #androiddev

9:16pm May 2nd 2014 via Falcon Pro

RT @sf2kuroppi: Stunfest 3vs3 ST Tournament streaming now. @JWonggg is up! http://t.co/uQCVIZDLKR #stunfest

6:29pm May 2nd 2014 via Falcon Pro

Super Street Fighter 2X - Team 3vs3 tournament brackets #stunfest, finals starting now! http://t.co/EgRqY3BRVg

5:54pm May 2nd 2014 via Falcon Pro

@SeLaKotel @0xroot es un Madcatz Fightstick Pro con el artwork & plexiglass customizado

11:25am May 2nd 2014 via Falcon Pro in reply to SeLaKotel

RT @billysastard1: @pof @_RetroGaming_ mb vectrex, tandy trs-80 model 3, can't see enough of the one on the far left.

11:04am May 2nd 2014 via Falcon Pro

RT @highlandboarder: @pof @_RetroGaming_ thats a vectrex on the left, TRS-80 on the right?

11:04am May 2nd 2014 via Falcon Pro

@0xroot jajaja... no, ha sido casualidad :P

10:45am May 2nd 2014 via Falcon Pro in reply to 0xroot

anyone recognizes those old glories? #retrogaming http://t.co/s8cjdGB8dE

10:25am May 2nd 2014 via Falcon Pro

@llepen system is already up to date - 20140328-1829

5:08am May 2nd 2014 via Falcon Pro in reply to llepen

@llepen @omatetruesmart unfortunately I can't... touch panel failure on my unit :'-( https://t.co/856N8KZW1c

4:26am May 2nd 2014 via Falcon Pro in reply to llepen

@State_X jajaj si, es mame4droid :)

5:08pm May 1st 2014 via Falcon Pro in reply to State_X

.@jssec_org releases English version of Android Application Secure Design/Secure Coding Guidebook - http://t.co/K2CNUiqzyW (4Mb PDF)

4:14pm May 1st 2014 via web

Super Street Fighter 2X on Android Smartwatch: http://t.co/VhqFv0oFF7 via @YouTube

4:08pm May 1st 2014 via Google

RT @devunwired: The Android Process Explorer tool from @opersys looks like a great remote process viewing tool! Great work! http://t.co/sE35jYiAn7 #lfabs

3:33pm May 1st 2014 via Falcon Pro

RT @grsecurity: Article on some ARM kernel exploitation techniques that don't work on a grsec kernel with KERNEXEC: http://t.co/XFzBgQsBHn

3:31pm May 1st 2014 via Falcon Pro

@thegrugq yes, via Google cloud print ;-)

2:39pm May 1st 2014 via Falcon Pro in reply to thegrugq

it's even playable with a bluetooth joystick ;) #SuperTurbo #Smartwatch http://t.co/b1GRDAoM1R

2:31pm May 1st 2014 via Falcon Pro