Tweets from July 2016

RT @virqdroid: The Android Open Pwn Project (and You) - https://t.co/NTrcv3cyTH

7:24pm July 30th 2016 via FalconPro3

RT @CopperheadOS: SELinux /proc restrictions introduced in Android N remove the side channels in https://t.co/2WCAsoEjiF for third party (untrusted) apps.

1:05pm July 30th 2016 via FalconPro3

RT @phretor: [RELEASE] gplay-scraper: A Minimalistic Google Play Store scraper for #android apps: https://t.co/QQGk1eXHhY

12:13pm July 30th 2016 via FalconPro3

RT @CopperheadOS: These perf events vulnerabilities won't be exposed anymore in Android N since https://t.co/9QhKCO8mTO was accepted: https://t.co/RV56KzCCQp.

9:33pm July 29th 2016 via FalconPro3

RT @IOActive: Want to reverse a classic #Streetfighter video game? So does @pof - Come to #IOAsis on 8/5 and find out how: https://t.co/7ZU7D3CEYm #DEFCON

4:41pm July 29th 2016 via FalconPro3

RT @jduck: If you're new to vulnerability research or thinking about starting, come see @SushiDude and I's talk at @defcon 24! https://t.co/MyVeUQWmtq

3:53pm July 28th 2016 via FalconPro3

RT @jeffvanderstoep: Protecting Android with more Linux kernel defenses. Thank you kernel devs for your important work! https://t.co/3IAcfWncYZ

3:53pm July 28th 2016 via FalconPro3

RT @chiachih_wu: Some Ideas about Fuzzing Android OMX Shared at #hitcon2016: https://t.co/vri3ZQj3wJ @Mingjian_Zhou @C0RETeam

8:18pm July 27th 2016 via FalconPro3

RT @claud_xiao: "Android Compiler Fingerprinting" by @caleb_fenton and @timstrazz at #hitcon2016 slides: https://t.co/YtZ9RjRgOB

8:15pm July 27th 2016 via FalconPro3

@ahoog42 @keithmokris @marcograss sure! let's meet if you are around :)

5:19pm July 27th 2016 via FalconPro3 in reply to ahoog42

@papasi not sure, but i will share the links if it is recorded

7:53am July 27th 2016 via FalconPro3 in reply to papasi

in Las Vegas for BH/DefCon? come to #IOAsis and don't miss my talk about #retrogames! (RSVP) https://t.co/suuIBSpDhB https://t.co/YGWpXgaQNs

9:57pm July 26th 2016 via Twitter for Android

RT @IOActive: Final talk schedule for #IOAsis is live! Register NOW to hear about #autosec + #smartcities + #IoT https://t.co/7ZU7D3CEYm

9:36pm July 26th 2016 via FalconPro3

RT @caleb_fenton: Released dex-oracle v1.0.5, android deobfuscation tool - https://t.co/BlTGNgTZQ9 https://t.co/86rysK1p8N

7:27pm July 26th 2016 via FalconPro3

RT @Morpheus______: Constantly updating #Android #Internals #Vol1 #Book!Keeping ahead of #Marshmallow,#N. #Vol2 *finally* coming in Oct! https://t.co/2AfDSXS2kH

7:19pm July 26th 2016 via FalconPro3

@jchensor @the_strevival that would be awesome! I always learn something new when I hear you commentating ST <3

7:32pm July 25th 2016 via FalconPro3 in reply to jchensor

RT @yangrunenberger: Quite complete deck on VoLTE security (signaling, SIM card etc) https://t.co/SEqC9LVhBg

5:38pm July 23rd 2016 via FalconPro3

RT @dfunc: Technical analysis by @anestisb for Android CVE-2016-0835 now available here: https://t.co/PS38iOTp8T #CENSUS_SA

5:38pm July 23rd 2016 via FalconPro3

RT @timstrazz: A dynamic binary instrumentation kit targeting on Android 5.0+ https://t.co/kuWUEoRUZo

12:16pm July 23rd 2016 via FalconPro3

RT @timstrazz: APKiD published, tool for identifying Android Packers, obfuscators and other interesting features https://t.co/nk64XVzAgX

11:02am July 22nd 2016 via FalconPro3

RT @kutyacica: FYI Samsung's Shannon uses OSS, not Osys for ASN1. (Pretty much everyone is either/or; a string grep on a fw tells you which.)

11:01am July 22nd 2016 via FalconPro3

@jcase is this overlapping with @jduck party?

7:34pm July 21st 2016 via FalconPro3 in reply to jcase

RT @jduck: Here's a teaser of my CVE-2015-3864 Metasploit module. It improves on Metaphor significantly. See it in real time: https://t.co/255d13ZP6S

7:31pm July 21st 2016 via FalconPro3

@rj_chap i have very little time now :( but if you have experience with any other assembler getting used to m68k shouldn't take long :)

12:26am July 21st 2016 via Twitter for Android in reply to rj_chap

@rj_chap nope, never looked into that game 0:-)

8:28pm July 20th 2016 via FalconPro3 in reply to rj_chap

RT @Comsecuris: First post on our brand new blog: Samsung baseband RE tools release https://t.co/NLAyDwJTAL

12:12pm July 20th 2016 via FalconPro3

RT @Rgoestotheshows: Just released tech report with results from my #LTE #security and #exploit research and @shmoocon talk. #infosec https://t.co/sZqVllSG0j

12:06pm July 20th 2016 via FalconPro3

RT @jeffvanderstoep: New in Android N: Strictly Enforced Verified Boot with Error Correction https://t.co/5LvbnxcHjn Thanks @samitolvanen!

9:40pm July 19th 2016 via FalconPro3

RT @esizkur: Bugs like these are golden baseband bugs: they allow attack over UMTS or LTE air interface before authentication. https://t.co/VcW0DlygRT

12:37pm July 19th 2016 via FalconPro3

RT @AndroidPolice: Android 7.0 now shows if an APK was installed from the Play Store or another source https://t.co/wl5txNuqkd https://t.co/5jTur6O8nC

12:36pm July 19th 2016 via FalconPro3

RT @AndroidDev: Got technical questions for the Android eng team? Join our first #RedditAMA on r/androiddev July 19 at 12PM PT https://t.co/ualOiaF6MX

8:14pm July 18th 2016 via FalconPro3

RT @PwnieAwards: We know what time it is. Do you? It's time for the annual 2-weeks late announcement of (most) of the Pwnie Nominees! https://t.co/zbDPwb05xF

8:07pm July 18th 2016 via FalconPro3

RT @raviborgaonkar: SoftBank Group buys ARM semiconductor for 32 Billion, interesting move - https://t.co/sfaStGANmW

7:53pm July 18th 2016 via FalconPro3

RT @grittygrease: Very powerful and usable Android IPC firewall by @Davidwuuuuuuuu presented at @SummerC0n https://t.co/tRRz756yEY, also does GPS spoofing.

5:59pm July 18th 2016 via FalconPro3

@chrisawcom sorry haven't used it maybe in ~10 years

8:13pm July 16th 2016 via FalconPro3 in reply to chrisawcom

RT @virqdroid: AndroFuzz - A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process https://t.co/SvY3IGr65h

7:33am July 15th 2016 via FalconPro3

RT @radareorg: r2con tickets are now on sale! https://t.co/pVU7iui2vY

3:31pm July 14th 2016 via FalconPro3

RT @mwrlabs: New tool release! icmptunnel, a tool for Pivoting with Ping :D writeup: https://t.co/UgzAClsIDe & code: https://t.co/1rRQBW1Wjt

3:31pm July 14th 2016 via FalconPro3

RT @collinrm: Mobile Security News Update July 2016 https://t.co/MujmoXRfo9 It is summer so I don't get stuff done! #muchtoolate

4:02am July 13th 2016 via FalconPro3

RT @Genymotion: Frog lets you access the official Android documentation from the command line. Neat 🐸https://t.co/M1NRcHKufl https://t.co/xGSYAdud7f

3:32am July 13th 2016 via FalconPro3

RT @caleb_fenton: "Death and the Java Class Loader" https://t.co/xhCrvnxwqy

6:50pm July 10th 2016 via FalconPro3

RT @ScottyBauer1: CVE-2016-250 PoC. This one is cool, Heap overflow, and integer promotion rules caused an infinite loop in the kernel https://t.co/sMeMD6FyRT

7:23pm July 9th 2016 via FalconPro3

RT @jeffvanderstoep: Stop logging to the sd card! Addressing some common logging shenanigans: https://t.co/JJ29Iod9II

6:48am July 9th 2016 via FalconPro3

RT @agl__: Android apps targeting API-level >= 24 (i.e. Android N) will not trust user- or admin-added CA certs by default: https://t.co/jxk34NnpBN

6:45am July 9th 2016 via FalconPro3

RT @4Dgifts: Hexag00n includes standalone pure Python disasm & an IDA processor for Qualcomm Hexagon https://t.co/yjznouqheX by Lucas Molas, @funsadosky

6:44am July 9th 2016 via FalconPro3

RT @AndroidPolice: Lawsuit reveals Silent Circle's Blackphone business is a complete and utter mess https://t.co/KULnyuYRL1 https://t.co/uIvjpJexqj

7:56pm July 7th 2016 via FalconPro3

RT @NCCGroupInfosec: NCC Group's Justin Taft credited for Priv Esc Vuln in Graphics Driver (CVE-2016-2067) in all Android from CAF - https://t.co/PsrBytF2mp

7:40pm July 7th 2016 via FalconPro3

RT @collinrm: Discovered new element "basicIntegrity: true/false" in Android's SafetyNet Attestation. Need to investigate what this indicates. #android

9:07pm July 6th 2016 via FalconPro3

RT @veorq: Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore https://t.co/86u65neEwY

6:51pm July 6th 2016 via FalconPro3

RT @AndroidPolice: Samsung posts July security bulletin ahead of Google, including 4 Samsung-specific… https://t.co/zr4OqPK1H7 https://t.co/pZl49mitge

1:48pm July 6th 2016 via FalconPro3

RT @ProjectZeroBugs: Samsung Android: JACK ASLR bypass https://t.co/fgQyxNEsO0

1:48pm July 6th 2016 via FalconPro3

RT @ProjectZeroBugs: Samsung Android: JACK privilege elevation https://t.co/A13nY2gJtF

1:48pm July 6th 2016 via FalconPro3

RT @jianqiangzhao: The exploit for CVE-2016-2434 https://t.co/xqRyZnD099 Google has released the patch.

9:57pm July 5th 2016 via FalconPro3

RT @javutin: I wrote a tool to enable 2-factor confirmation of USB devices. It uses DUO auth API and you can customize actions: https://t.co/jMTpjib1F0

9:56pm July 5th 2016 via FalconPro3

RT @rafaybaloch: 302 Redirect is always a danger - Wget Arbitrary Commands Execution - https://t.co/5sHvAuP7Jr #wget #302redirect

9:29pm July 5th 2016 via FalconPro3

RT @laginimaineb: @laginimaineb Full exploit source code: https://t.co/cwTN4d558j I've also written python scripts to bruteforce FDE: https://t.co/6UkTNl9fgY

10:46pm July 2nd 2016 via FalconPro3

RT @laginimaineb: New blog post: https://t.co/Ni9RdLWwIp Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption! https://t.co/fE5Bc6ndUJ

10:46pm July 2nd 2016 via FalconPro3

RT @Cunchem: Update: @Android permissions have been changed in response to our findings #privacy #wifi https://t.co/ZK9gcfvKfv https://t.co/DKT4zNVFW5

10:03pm July 2nd 2016 via FalconPro3

RT @tushardalvi: QARK now supports custom plugins (https://t.co/M5fgKx0vFg). If you build a handy plugin, we would be delighted to see a pull request #QARK

10:01pm July 2nd 2016 via FalconPro3

RT @ValdikSS: I just published “Researching protection and recovering Namco System ES1 arcades” https://t.co/84RX9Uv5WU

6:49am July 1st 2016 via FalconPro3

RT @timstrazz: Protip: If you're looking at the packer used by "leveldropper", run this script to make it even easier; https://t.co/by8dmPwRc0

6:47am July 1st 2016 via FalconPro3