Tweets from April 2016

RT @jebdec: Thanks to B. Kerler for his WhatsApp decryptor script for JEB. Great to see our users sharing their plugins :) Src: https://t.co/C1HYQfXHbL

7:17pm April 30th 2016 via FalconPro3

RT @idcAvalaunch: #Capcom #CPS2 encryption unravelled. Now able to rewrite keys to dead game boards. You're welcome. ;) https://t.co/t4BXkJqmBB

7:10pm April 30th 2016 via FalconPro3

RT @ESET_ES: Exclusiva mundial en #ArcadeCon Reviviendo una placa CPS2 de Capcom gracias a la genial investigación de @edcrossed https://t.co/KxmDyY89MD

7:08pm April 30th 2016 via FalconPro3

Clean desuicide of dead Capcom CPS2 games is finally possible thanks to @edcrossed & co. - https://t.co/PX1yS7lDo9

7:07pm April 30th 2016 via FalconPro3

RT @AndroidDev: Enhance your apps' security with the @GooglePlay App Security Improvement Program. Learn more about it here: https://t.co/GQnGM9Ekcs

4:37am April 30th 2016 via FalconPro3

RT @AndroidTamer: AppMon: Greasemonkey for Mobile Apps: based on @fridadotre developed by @dpnishant : https://t.co/JIeklSUqFF : Runtime Modification of Apps

7:50pm April 29th 2016 via FalconPro3

RT @mwrlabs: We just uploaded a new tool created by @ukstufus for rapid @OpenVPN certificate & configuration deployment https://t.co/RezIJJjbLb

7:42pm April 29th 2016 via FalconPro3

RT @4Dgifts: nogotofail-pii is a fork of the nogotofail tool. It's aim is to test Android apps for network based privacy issues https://t.co/U2Ig0rsQUp

7:37pm April 29th 2016 via FalconPro3

Mobile Security Bullshit Bingo: print a random-generated card for your next meeting! - https://t.co/egYB2Q7JMi https://t.co/lZ23Fb0Bws

8:26am April 29th 2016 via Twitter Web Client

RT @laginimaineb: First post in the new zero-to-TrustZone series is up! Exploring QSEE - Qualcomm's Secure Execution Environment. https://t.co/3jfGwnfNpF

12:55am April 27th 2016 via FalconPro3

RT @laginimaineb: @laginimaineb Apparently if you crash a trustlet, QSEE doesn't like re-loading it and stops behaving sanely after ~50 crashes. (2/2)

12:55am April 27th 2016 via FalconPro3

RT @timstrazz: Also fixed them in the AXMLPrinter source as well, https://t.co/SxoMb0DRJm https://t.co/qL0sxeXiGy

12:42am April 27th 2016 via FalconPro3

RT @timstrazz: If you ever wondered what the "unknown" chunks in AXML are, I finally grok'ed the code and fixed my templates https://t.co/8ys6Wppr9E

12:42am April 27th 2016 via FalconPro3

RT @dyn___: My 122 page Linux containers security and hardening paper is finally out! Threats, Recs, Docker, LXC, and much more: https://t.co/2HHQsUbXJW

12:24am April 27th 2016 via FalconPro3

RT @evilsocket: How I defeated an obfuscated and anti-tamper APK with some Python and a home-made Smali emulator. https://t.co/qhwzvuhl1t

2:41am April 21st 2016 via FalconPro3

RT @CopperheadSec: So TEE-derived keys like disk/file encryption keys are not only tied to the hardware-bound key, but also the OS-specific verified boot key.

6:21am April 17th 2016 via FalconPro3

RT @CopperheadSec: If you're curious about why the 5X / 6P force a factory reset when locking, it's because TEE key derivation makes use of the dm-verity key.

6:21am April 17th 2016 via FalconPro3

RT @CopperheadSec: Android is moving to enforcing storage verification at runtime: https://t.co/x4IyhszVWF. It's going to be much more than just a warning now.

7:13pm April 14th 2016 via FalconPro3

RT @jebdec: Crypto hooking on Android using the JEB debuggers API, demo plugin at https://t.co/rOK6MijleT https://t.co/O7z3SLZ9vl

7:12pm April 14th 2016 via FalconPro3

RT @jduck: Okay, maybe it's not impossible after all... Updated patch for ADB to cd /data/local/tmp is here: https://t.co/XdYgVLzHqC \o/

7:10pm April 14th 2016 via FalconPro3

RT @jduck: Hardening Measures in Android N Cripple System Utility and Security Applications https://t.co/Hdf7lSqLpQ

6:52am April 14th 2016 via FalconPro3

RT @rpaleari: We just posted the details of the Samsung "lock bypass" video we tweeted some months ago (with @joystick): https://t.co/lVtIxkKtTb

5:38am April 14th 2016 via FalconPro3

RT @yangrunenberger: « Samsung Android phones expose (or can be forced to expose) a serial interface » (even with adb disabled.) https://t.co/LwEreTBKm4

5:38am April 14th 2016 via FalconPro3

RT @tiraniddo: Fun bug collision with @oldfresher in Android https://t.co/SnrGLLa0no also bonus info leak https://t.co/zouKHWqZMA

5:07am April 14th 2016 via FalconPro3

@mountainmanjed i think yes, but i usually use the regular updated mame for the debugger, not mame-rr

12:34pm April 13th 2016 via Twitter Web Client in reply to mountainmanjed

@JosepAlbors @edcrossed el sábado podría pero el domingo lo tengo complicado... a ver si a última hora me lo puedo montar :)

9:18pm April 11th 2016 via Twitter for Android in reply to JosepAlbors

@JosepAlbors wow, que bien pinta, con charla de @edcrossed y todo!

9:09pm April 11th 2016 via FalconPro3 in reply to JosepAlbors

RT @Morpheus______: Compile your own #Android C/C++ outside the NDK lunch/ndk-build scripts using this: https://t.co/rUp0VoZy9n (or androidcc for 32-bit)

7:23pm April 7th 2016 via FalconPro3

RT @ikoz: New Android emulator is sweet https://t.co/xMn6VCcKLG

7:22pm April 7th 2016 via FalconPro3

RT @therealundamned: The man who unraveled the mysteries of Capcom's Kabuki encryption, @edcrossed, is set to begin work on CPS2: https://t.co/c9o03diHOb

1:02pm April 7th 2016 via FalconPro3

RT @therealundamned: Huge props to Michael J. Moffitt for his CPS2VGA work. 1 scanline of latency, so your LCD is worst case. Latest: https://t.co/hX3nsW9jgG

5:00am April 7th 2016 via FalconPro3

@HiRisk808 yeah, just updated my #PS4 to 3.50 and my Brook Universal Fighting Board started to timeout after 8 min again :((( #sadpanda

12:19pm April 6th 2016 via Twitter Web Client in reply to HiRisk808

@brookgamingfans the @PlayStation 3.50 update breaks universal fighting board with latest firmware, need to replug every 8 minutes again! :(

12:15pm April 6th 2016 via Twitter Web Client

RT @ax330d: While working on something, found this article on Android kernel security — https://t.co/Ew9yI0h41J

9:05am April 6th 2016 via FalconPro3

RT @dchest: WhatsApp Encryption Overview: Technical white paper https://t.co/Aiu2dnDOR9 [PDF] https://t.co/yGVMtak0Gy

8:52am April 6th 2016 via FalconPro3

RT @whispersystems: WhatsApp's Signal Protocol integration is now complete. End to end encryption for everyone by default: https://t.co/vVNn7xko2y

8:51am April 6th 2016 via FalconPro3

RT @Morpheus______: #Android ImgTool (to take apart/rebuild #Boot partition (#kernel+ #ramdisk) images):updated to support #Samsung 6E.. https://t.co/cttidimFEZ

8:18am April 6th 2016 via FalconPro3

RT @timstrazz: Feeling like a hipster reading this commit, https://t.co/gmI2ytCcSc I remember when we only need dex\n035\00 supported for disassembling!

8:16am April 6th 2016 via FalconPro3

RT @frwololo: Release: Fully operational dlclose exploit + Linux for PS4, by kR105 https://t.co/FuGTlpOAKB https://t.co/Thfe673HR0

7:55am April 6th 2016 via FalconPro3

RT @binitamshah: Fuzzing and Exploiting parcelization vulnerabilities in Android : https://t.co/9fv1kVT1sW (Slides) #BHASIA

7:48am April 6th 2016 via FalconPro3

RT @299792456nelson: @timstrazz Already found a beacon that follows the recommendation in https://t.co/9x8ZVVnVkO to allow anon reconfig after reboot. lo

7:46am April 6th 2016 via FalconPro3

RT @299792456nelson: @timstrazz looks like it uses https://t.co/GDblO9EHBC. Time to have some fun.

7:37am April 6th 2016 via FalconPro3

RT @Morpheus______: #Android-philes:Haven't forgotten you!Powerful,Android-aware, modular strace-for #reversing:https://t.co/NTYkobJtwU https://t.co/h1U8TraU2H

7:34am April 6th 2016 via FalconPro3

RT @Snow_Basinger: iovyroot - (temp) root tool - xda-developers https://t.co/t2YNg1siQu

7:31am April 6th 2016 via FalconPro3

RT @Fuzion24: Signal is using docker and a custom apk signature verifier to do (mostly) reproducible builds : https://t.co/UlmgPQdhNL

7:19am April 6th 2016 via FalconPro3

RT @ikoz: How to test for CVE-2016-2402 and similar certificate pinning flaws https://t.co/az87a30Q7J

6:28am April 6th 2016 via FalconPro3