Tweets from January 2015

RT @jduck: My boss's promises to members of our R+D team - https://t.co/o2l1G4WgeH

11:25pm January 31st 2015 via Falcon Pro 2015

@albertrafols desde Linux pots flashejar Samsung amb heimdall

2:52pm January 31st 2015 via Falcon Pro 2015 in reply to albertrafols

RT @Fuzion24: Any app can root on almost every device < Android 5.0 using (a modded ver of) these: https://t.co/W5sxOsrpVh https://t.co/7ywP1vOE2J

8:17pm January 30th 2015 via Falcon Pro 2015

RT @AndroidPolice: Google Now Is Getting Ready To Give You Cards From Third Party Apps http://t.co/CNWOUZ3iJd

8:16pm January 30th 2015 via Falcon Pro 2015

RT @NowSecureMobile: A technical breakdown of Corrupdate, also known as CVE-2015-0863 AND CVE-2015-0864: https://t.co/hDy1VwvdxJ http://t.co/TiUF4LQe4A

11:08pm January 29th 2015 via Falcon Pro 2015

RT @AndroidPolice: [Nom Nom No] Chrome Beta Now Lets You Disable Third-Party Cookies While Still Allowing First-Party Ones http://t.co/tRz88UMJLe

11:00pm January 29th 2015 via Falcon Pro 2015

@oscarjessvillar my advice is to do CTFs, wargames, crackmes, reverse malware samples, etc: everything that gives you hands on experience :D

10:49pm January 29th 2015 via Falcon Pro 2015 in reply to oscarjessvillar

@jduck i know and I'm using my wear watch as trusted agent, but it annoys me when the watch battery dies :(

10:09pm January 29th 2015 via Twitter for Android in reply to jduck

One of the things that annoys me most on Lollipop: unnecessary need to swipe up to access the PIN/Pattern screen - https://t.co/T21R27NaGf

8:28pm January 29th 2015 via Twitter Web Client

RT @insitusec: proud of my team discovering #Corrupdate MITM attacks on core Samsung system components https://t.co/owy88ycQ7m

10:55pm January 28th 2015 via Falcon Pro 2015

RT @claud_xiao: Chinese translation of Android Hacker's Handbook will be published soon. Would you like to write a preface for it? @jduck @pof @collinrm

6:18pm January 28th 2015 via Falcon Pro 2015

@timstrazz @0xroot sabrepulse released a new album 2 days ago - http://t.co/ymrHO3qEsF

1:54pm January 28th 2015 via Twitter Web Client

RT @xdadevelopers: Hidden App Ops Found on LG G3 - No Root! http://t.co/LWs5YAJwRU

11:10am January 28th 2015 via Falcon Pro 2015

RT @mdowd: Released remotely exploitable Blackphone/SilentText bug. Requires only target's phone number/ID to exploit: http://t.co/0MDoOw2ueQ

9:23am January 28th 2015 via Falcon Pro 2015

RT @roman_soft: "Ghost": critical vulnerability in glibc. See: https://t.co/NjRhwkEMX1 And: https://t.co/GEHkPRkonS **P-A-T-C-H---P-A-T-C-H---P-A-T-C-H** !!

8:09pm January 27th 2015 via Falcon Pro 2015

RT @kutyacica: @jduck @zer0mem @NTarakanov @thegrugq @thomas_coseinc @ebeip90 thx! Yep, PXN is in arm64 3.10. msm kernel, PAN we got into next ARM revision

8:04pm January 27th 2015 via Falcon Pro 2015

RT @PythonArsenal: StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Apps. Basedon AndroGuard https://t.co/WDtzqCLglc

8:03pm January 27th 2015 via Falcon Pro 2015

RT @cekagedev: @pof @thegrugq I used setprop log.tag.SMS VERBOSE to spy on SMS (helps me to grab OMTP key exchange)

4:53pm January 27th 2015 via Falcon Pro 2015

Culebra: tool to easily create AndroidViewClient python automation scripts - https://t.co/S6DIFYcfR4 demo video: https://t.co/nDSFwDcrWu

3:29pm January 27th 2015 via Twitter Web Client

useful SMSProxy app: let's you get the full SMS PDU using Xposed - https://t.co/pWHQ94vd39

3:26pm January 27th 2015 via Twitter Web Client

RT @zer0mem: @NTarakanov @thomas_coseinc @thegrugq PXN => s5, note3.. PAN (UDEREF) by nexus9 arm64 .. in this year, hopefuly more devices will support it

1:24pm January 27th 2015 via Falcon Pro 2015

RT @NTarakanov: Is there any Android device, that implements grsecurity protections: UDEREF, PXN?

1:24pm January 27th 2015 via Falcon Pro 2015

RT @Gunther_AR: Android WiFi-Direct Denial of Service - http://t.co/at0l9ylo3i

7:51am January 27th 2015 via Falcon Pro 2015

@simyo_es es posible cambiar el tipo de SIM sin tener q dictar la tarjeta de credito a la srta del 121 para que me cobren los 7 EUR d envio?

4:54pm January 26th 2015 via Twitter Web Client

RT @WEareTROOPERS: Interesting stuff from BruCON 0x06: @marver on attacks against SIM-cards https://t.co/99uQjfCS9c. Accompanying code https://t.co/XTqytXdddd

1:47pm January 26th 2015 via Falcon Pro 2015

RT @riusksk: giefroot:Android root by CVE-2014-7911 (by KeenTeam ) and CVE-2014-4322 (by zxz0O0) http://t.co/iOxsWKiZ5U http://t.co/h6jBAS9MOl

7:36am January 26th 2015 via Falcon Pro 2015

RT @AndroidPolice: Google Updates Its Android Compatibility Definition Document http://t.co/zNblxiqEBq

10:13pm January 25th 2015 via Falcon Pro 2015

RT @raviborgaonkar: Handy python based simulation portable-tool for SIM related protocols used in telecommunication security. http://t.co/jx4QETHJUn #GSM #LTE

8:06am January 25th 2015 via Falcon Pro 2015

RT @lcamtuf: Looking back at three months of afl-fuzz (I'll shut up now, promise): http://t.co/jBUUYGmyqJ

8:05am January 25th 2015 via Falcon Pro 2015

Adrian Ludwig response to the WebView updating issue in Android <=4.3 - https://t.co/BPsv2Ba06j

10:15pm January 23rd 2015 via Falcon Pro 2015

RT @Mobile_Sec: Appie, Android Pentesting Portable Integrated Environment http://t.co/RUSSawwYA2 by @exploitprotocol

1:21pm January 23rd 2015 via Falcon Pro 2015

RT @rotxed: I just published “How to debug HTTP(s) traffic on Android” https://t.co/a5wBbjL3Xs! Thanks @seebrock3r @sirnicolaz for proofreading

1:16pm January 23rd 2015 via Falcon Pro 2015

RT @timstrazz: Updated #010Editor DEX template to look at injected data at the end of a dex file; coworker recently saw ITW https://t.co/z2QLT6nYWH

2:38am January 23rd 2015 via Falcon Pro 2015

RT @xdadevelopers: Developing for ART and 64-bit Android http://t.co/T4D3KSb8Mk

7:49pm January 22nd 2015 via Falcon Pro 2015

RT @in7rud3: Rooting The Samsung AllShare Cast Hub - Secure Boot Bypass and Web CGI Command Injection http://t.co/u6SUGZNaHM

10:37pm January 21st 2015 via Falcon Pro 2015

RT @virqdroid: Attacking Android Applications With Debuggers - https://t.co/vse244UuP9 (nice article for mobile pentesting)

10:31pm January 21st 2015 via Falcon Pro 2015

RT @collinrm: Mobile Security News January 2015: http://t.co/3bbpMLnNYC

4:14pm January 21st 2015 via Falcon Pro 2015

RT @NowSecureMobile: Our own @0xroot and @marcograss will be speakers at Black Hat Asia in March: https://t.co/cQ3VpWWheC

4:07pm January 21st 2015 via Falcon Pro 2015

RT @tozny: Video: Here’s Isaac’s talk on “Common crypto mistakes in Android” http://t.co/I7HXtq0Qdt

4:04pm January 21st 2015 via Falcon Pro 2015

RT @virqdroid: ENCRYPTING STRINGS IN ANDROID: LET’S MAKE BETTER MISTAKES http://t.co/XWrQSLxR0Y [via @tozny] Video: http://t.co/hqpl6PrcoF [Great article]

3:59pm January 21st 2015 via Falcon Pro 2015

RT @TeamAndIRC: fotabinder mediatek exploit - https://t.co/bItUyEKdLj, for MTK devices (Made for the Hummer phone, hence the offensive app name)

8:59pm January 17th 2015 via Falcon Pro 2015

@3xcl4m4t10n no se como esta el soporte de wine en ARM, pero creo que verde.... el cliente debería funcionar sin problemas (pero solo chat)

5:59pm January 16th 2015 via Falcon Pro 2015 in reply to 3xcl4m4t10n

RT @virqdroid: Android APK packers technical solutions [2] - http://t.co/11Yqq4eMsN

2:37pm January 16th 2015 via Falcon Pro 2015

RT @virqdroid: Some nice tips on #android protector analysis [Defeating App protections  on Android] https://t.co/ExByxEpHKE

2:37pm January 16th 2015 via Falcon Pro 2015

RT @AndroidPolice: Google Posts Android 5.0.2 Factory Images And Binaries For The 2013 Nexus 7 And Nexus 10 http://t.co/HiDo9fUvxT

11:41pm January 15th 2015 via Falcon Pro 2015

RT @beist: We've developed an obfuscation program for Android apps. Targeting game/finance firms. Looking for business partners. Ping me if Interested.

9:54am January 15th 2015 via Falcon Pro 2015

RT @AndroidPolice: [For Developers] http://t.co/aBH6bgAp2V Curates And Lists Hundreds Of Libraries, Tools, And Resources For Android… http://t.co/ZqsshGnllF

11:02pm January 14th 2015 via Falcon Pro 2015

RT @BlackHatEvents: The most popular cross platform frameworks for mobile development and their vulnerabilities in this #BHASIA Briefing http://t.co/h3UAnw51r1

10:20pm January 14th 2015 via Falcon Pro

RT @Mobile_Sec: You can use Android Drawer to find older versions of Android apps http://t.co/fo07ijxV5q

10:20pm January 14th 2015 via Falcon Pro

RT @rapid7: Google no longer provides patches for WebView Jelly Bean & prior [BLOG]: http://t.co/8runMXketF by @todb http://t.co/1Xz3j7lyro

10:00pm January 14th 2015 via Falcon Pro

RT @timstrazz: TIL: AXMLPrinter2 was moved into APKTool (licensing removed) which is used by JEB, JEB provides fixes back to APKTool

9:43pm January 14th 2015 via Falcon Pro 2015

@EvilMrWizard @evo2k Super Street Fighter 2 Turbo, X-Mania & Tournament of Legends 3

1:02am January 13th 2015 via Falcon Pro in reply to EvilMrWizard

RT @maldr0id: Collection of #Android security related tools and resources: https://t.co/mJ25iCeRnc

3:54am January 11th 2015 via Falcon Pro

RT @xanda: Malformed AndroidManifest.xml in Apps Can Crash Mobile Devices http://t.co/wdJaJUuxrT

3:27am January 11th 2015 via Falcon Pro

@rallat you just need to practice a bit to beat me... you were close a few times! See you in @FightCade #ssf2xj

10:00pm January 9th 2015 via Falcon Pro in reply to rallat

@kapitanpetko yes, seems to be fixed already, also look at the comment in GitHub gist

2:47pm January 9th 2015 via Falcon Pro in reply to kapitanpetko

Android app with full control over your Google account - http://t.co/A3sugpI9Zi + PoC: https://t.co/tjsnsIRukj

2:30pm January 9th 2015 via Falcon Pro

CodeInspect: A new Reverse-Engineering Tool for Android and Java Bytecode - http://t.co/8eCgCPq7B4

2:28pm January 9th 2015 via Falcon Pro

@edcrossed felicitats pel teu treball amb kabuki, ara he acabat de veure els videos, molt interessant!! desitjant veure q faràs amb cps2 :D

12:42am January 9th 2015 via Falcon Pro

@mountainmanjed waiting to see that code appear in your EmuLuaScripts repo ;-)

1:47pm January 7th 2015 via Twitter Web Client in reply to mountainmanjed

RT @mountainmanjed: Talking about the ST Ryu super glitch, and how much meat they have. http://t.co/Nrc4RGdnDh @angealbertini @STRhanasu

2:13am January 7th 2015 via Twitter Web Client

@negachaechalaga isn't there a proper training mode for 3S already? I've never played the game, sorry.

3:03pm January 6th 2015 via Falcon Pro in reply to negachaechalaga

RT @AndroidTamer: An Android Root Shell Framework : https://t.co/nOuXlhFhOT

12:02am January 5th 2015 via Falcon Pro

RT @Technologeeks: #Android app Backup/restore #internals explained: Excerpt from "Android Internals: Volume I" - http://t.co/zJPX7P1bAw http://t.co/Afg1sROKRs

11:58pm January 4th 2015 via Falcon Pro

RT @collinrm: Mobile Security News Update New Year's edition 2014/2015! http://t.co/LqxW20ZogY #31c3 was a good conference for mobile security

11:57pm January 4th 2015 via Falcon Pro

RT @angealbertini: if you don't have the time to watch my #31c3 talks, the slides are now available https://t.co/LEVs5pF610 https://t.co/hdD5SGEcQ0

11:57pm January 4th 2015 via Falcon Pro

RT @angealbertini: if you liked the arcade talk, you can watch the extended version @ https://t.co/U7jYpasggF + beg @tabascoeye to also release the bonus

11:45pm January 4th 2015 via Falcon Pro

@angealbertini @lostinsecurity @edcrossed really nice work, i'll read it over the weekend! thanks for pointing it out :)

11:05pm January 2nd 2015 via Twitter Web Client in reply to angealbertini