Tweets from May 2016

RT @Mobile_Sec: A reference guide that shows private notes of @doriancussen about Android Security: https://t.co/CE32XOxXH3

8:50pm May 30th 2016 via FalconPro3

RT @Mobile_Sec: JNIStorLab: Script to find the address of JNI methods in ELF files. https://t.co/2WSPVchXrW by @OstorlabSec

8:49pm May 30th 2016 via FalconPro3

RT @duo_labs: 60% of Androids vulnerable to "super-root" privesc via @Qualcomm firmware attack: https://t.co/jvpgxTb5mL https://t.co/A2RmKbBG6f

8:41pm May 26th 2016 via FalconPro3

RT @FredericJacobs: Android N's cert pinning API is easy-to-implement & flexible. Works with custom certs. https://t.co/BENiOp90Sr https://t.co/dDrjG8Sxxd

7:13pm May 26th 2016 via FalconPro3

RT @rsesek: In #Android N, we've been working on making WebView multi-process & sandboxed. It's under a developer option: https://t.co/8rlF4kt5bw #io16

4:57pm May 26th 2016 via FalconPro3

@guimarpe Hola, passa'm el teu email per DM i et poso en contacte.

4:27am May 18th 2016 via Twitter for Android in reply to guimarpe

RT @virqdroid: A study on obfuscation techniques for Android malware - M Pomilia - 2016 - https://t.co/kTRuPkxJlh

7:40pm May 13th 2016 via FalconPro3

RT @udgover: If you want to read "rootmydevice" magic string backdoor, code is still available in A83T branch :) https://t.co/k0xbFaCfDF #Allwinner

7:28pm May 13th 2016 via FalconPro3

RT @idcAvalaunch: Afraid not, the key is stored within an area of one of the custom Capcom chips, not in a dedicated RAM chip. https://t.co/IXAcZsvniI

7:43pm May 11th 2016 via FalconPro3

RT @abd_sec: Interested in Broadcom WiFi RCE CVE-2016-0801? PoC code is ready for your attention https://t.co/Sbyr8q7R7m #nopcon

7:29pm May 11th 2016 via FalconPro3

RT @virqdroid: DexExtractor - Android dex file extractor, anti-bangbang (Bangcle) - https://t.co/Q0nwbQtxtx

7:27pm May 11th 2016 via FalconPro3

RT @AndroidPolice: Google Now Posting Full OTA Images For Nexus Devices Alongside Factory Images https://t.co/vK3JYT60Gb https://t.co/Joute0XX8w

3:03am May 11th 2016 via FalconPro3

RT @ChainfireXDA: SuperSU v2.72 BETA released - https://t.co/UuGM7jnAdJ

2:47am May 11th 2016 via FalconPro3

RT @PentestCorner: Introduction to Fridump: Dumping memory from iOS, Android and other applications using Frida @fridadotre https://t.co/kpNrG6jxUz

11:58pm May 9th 2016 via FalconPro3

RT @whitequark: interactive disasm with pseudocode. very cool. i wanted so many times to use sth like it https://t.co/2srPoUlzY3 https://t.co/FbnjooeBfk

7:47am May 9th 2016 via FalconPro3

RT @jeffvanderstoep: How to test your script/binary in the same security context as a regular third party app (UID/GID/SELinux-domain): https://t.co/AfsYXvPl0z

6:32am May 9th 2016 via FalconPro3

RT @jeffvanderstoep: A quick how-to on ioctl whitelisting for Android M https://t.co/gcvJ7kQzq7

6:30am May 9th 2016 via FalconPro3

RT @collinrm: Mobile Security News Update May 2016: https://t.co/RSGZs8jE8o <-- I need to do this more often again!

1:46pm May 8th 2016 via FalconPro3

RT @jcase: Exploiting uboot to unlock the Amazon kindle https://t.co/Ex6oHkXole via @spudowiar

1:41pm May 8th 2016 via FalconPro3

RT @laginimaineb: Just published a new blog post: https://t.co/GGxAVxM7nd War of the Worlds - Hijacking the Linux Kernel from QSEE. https://t.co/dWEdMiPVs1

1:33pm May 8th 2016 via FalconPro3

RT @therealundamned: If you write embedded C code and aren't familiar with how or why to use "volatile," here is a great read: https://t.co/qxKJseQcSQ

7:23pm May 7th 2016 via FalconPro3

RT @marcograss: [CVE-2016-2443] Qualcomm MSM debug fs kernel arbitrary write - https://t.co/QiuOJmBFPd

9:18am May 3rd 2016 via FalconPro3

RT @ScottyBauer1: CVE-2016-2445 POC:https://t.co/K6p7w1azJo Full exploit soon.

1:45am May 3rd 2016 via FalconPro3

Thanks Rubén! Very excited to be part of the @IOActive team :D https://t.co/pEgaNzzX66

8:16pm May 2nd 2016 via FalconPro3

@iamnion @Comsecuris @esizkur @kutyacica wow what a surprise! Congratz to all :)

7:42pm May 2nd 2016 via FalconPro3 in reply to iamnion

RT @AndroidTamer: May 2016 Security updates : another bunch of Vulnerabilities fixed: Vulns across the board from 4.4.4 till 6.0.1 : https://t.co/SaOXnP7IBx

7:39pm May 2nd 2016 via FalconPro3

RT @laginimaineb: Just published a new post in the zero-to-TrustZone series: https://t.co/PPdlCpuRr2. QSEE privilege escalation vulnerability and exploit!

7:34pm May 2nd 2016 via FalconPro3

RT @AndroidTamer: Android Security Cookbook by @k3170Makan & @scottyab available for free today https://t.co/ZRlsbzTrL8 : must buy for security professiona

7:32pm May 2nd 2016 via FalconPro3