Tweets from August 2016

RT @AndroidDev: Missed our update on Android N’s new security features? Watch the video: https://t.co/B7AMmPgcIL https://t.co/Nt0377lNGu

7:52pm August 28th 2016 via FalconPro3

RT @muellerberndt: Rooting Android by exploiting Qualcomm's kernel drivers (impressive stuff) https://t.co/U84DgEroxk #Qualrooter #HITBGSEC

7:51pm August 28th 2016 via FalconPro3

RT @insitusec: I released v4.0.0 gpapi (node lib for talking to Play Store). Some breaking changes to API but support for more apps https://t.co/AbXWoG3l0u

12:38am August 25th 2016 via FalconPro3

RT @kernelpool: The "Demystifying the Secure Enclave Processor" white paper (software edition) on SEPOS and friends: https://t.co/9nYa5QXCRF

12:34am August 25th 2016 via FalconPro3

RT @insitusec: @doriancussen @pof nice resource! https://t.co/8ApqUywlhB is quite nice for back porting netSecPol to API 17

12:18am August 25th 2016 via FalconPro3

RT @angealbertini: including "Street fighter hacking", by @pof :) https://t.co/PEnniWzicX

1:10pm August 23rd 2016 via FalconPro3

RT @caleb_fenton: Just finished "Understanding Dalvik Static Fields part 2 of 2" - https://t.co/h5igBX0vcJ https://t.co/IFluXfrqnp

12:54pm August 22nd 2016 via FalconPro3

RT @AndroidTamer: OWASP Hacking Playground : a vulnerable mobile app to complement OWASP Mobile testing guide (work in progress): https://t.co/Wf1aTrcD9J

8:05pm August 18th 2016 via FalconPro3

RT @timstrazz: Forgot to make this repo public a while ago, contributions welcome to the compromised key collection; https://t.co/kV5uuDxzgb @RedNagaSec

7:54pm August 18th 2016 via FalconPro3

RT @jeffvanderstoep: Some interesting data on kernel vulns in Android and how we're addressing them #linuxsecuritysummit https://t.co/JivUADddHq

7:38pm August 18th 2016 via FalconPro3

@therealundamned damn, you broke japanese ST in mame from git :P https://t.co/DllekNi0sq

3:08pm August 18th 2016 via Twitter Web Client

@SwissHttp brand is MAZU. You can find it here: https://t.co/NFLmdOh4rN and https://t.co/ceWf7wXhmD i paid $15 for it. Good luck! :)

7:40am August 10th 2016 via Twitter Web Client in reply to SwissHttp

RT @radareorg: 12 confirmed talks and 20h of trainings for the r2con. That fills 3 days of congress with 2 tracks for the trainings. Awesome!

8:15pm August 9th 2016 via FalconPro3

RT @Morpheus______: New version of #Android jtrace64 - stable, and now #traces #binder messages! Deep inspection,plugin API coming soon! https://t.co/Jc3Lg6nAll

7:05pm August 8th 2016 via FalconPro3

@O10010110 too late dude, I'm back in Europe :(

11:13am August 8th 2016 via FalconPro3 in reply to O10010110

RT @esanfelix: Solve this fairly simple crackme to ensure you'll receive the real deal: an embedded board based ctf challenge :-) https://t.co/DBOnA9UW6R

10:59am August 8th 2016 via FalconPro3

RT @raviborgaonkar: We have released ongoing work on SEAndroid policies. Analysis tool & poster highlighting OEM mistakes https://t.co/biFOUhPNCB #Android

12:18am August 8th 2016 via FalconPro3

RT @leetmore: DEF CON CTF is almost over! Releasing our tools: qemu+cgc https://t.co/BkBXUGlTY9; afl+cgc https://t.co/au8fPrQ2GB #defcon #afl #qemu #cgc

12:14am August 8th 2016 via FalconPro3

@SwissHttp i have the padlock in my checked in luggage... will try to find the brand when I'm back, I remember there was a logo on the side

8:45pm August 7th 2016 via Twitter for Android in reply to SwissHttp

@SwissHttp @marcograss check out if you can find it on the sparrows website: https://t.co/ziQRPPolpa

8:31pm August 7th 2016 via FalconPro3 in reply to SwissHttp

got a new lock picking set in @defcon's #lockpicking village :) https://t.co/ZEdxuUAlOf

12:29am August 7th 2016 via Twitter for Android

RT @marcograss: Learned how to lockpick thanks to @pof :D https://t.co/TKi3wXYSZz

12:00am August 7th 2016 via Twitter for Android

RT @BlackHatEvents: UPDATE: All the #BHUSA 2016 presentation materials that we received from our speakers are now posted here: https://t.co/6T0kqcvWi4

4:35pm August 6th 2016 via FalconPro3

RT @AndroidDev: Request just what you need read/write access to with Scoped Directory Access on #AndroidNougat https://t.co/iXYCPaUPd8

2:13pm August 5th 2016 via FalconPro3

RT @kutyacica: Wonder where those 2013/2014 Qualcomm vulns are coming from? https://t.co/dNAGEJZPSW Why are they in a bulletin *now*? ¯\_(ツ)_/¯

5:25am August 3rd 2016 via FalconPro3

@timstrazz happy birthday! See you soon in Vegas? :-)

6:56pm August 2nd 2016 via FalconPro3

RT @CopperheadOS: The perf restrictions (https://t.co/ULyHeoV3Og) are also shipping in this month's security update for Android M: https://t.co/WOFmRP0bkn.

6:56am August 2nd 2016 via FalconPro3

RT @caleb_fenton: "Understanding Dalvik Static Fields part 1 of 2" https://t.co/9Yk7tZBySf https://t.co/F8aecMj8Zx

7:09am August 1st 2016 via FalconPro3

RT @RedNagaSec: "Detecting Pirated and Malicious Android Apps with APKiD" https://t.co/8DvB7F5ylW cc @timstrazz || @caleb_fenton https://t.co/tExjwqeBYh

7:03am August 1st 2016 via FalconPro3