RT @CopperheadOS: Need to keep in mind the SELinux layer when looking at Android's seccomp policies like https://t.co/d0vu3Q0uts and https://t.co/MNreSH6p8i.
RT @virqdroid: How to View TLS Traffic in Android’s Logs - https://t.co/k7baj4swen
@RetroRic79 no problem if you come a bit early, I'll be around
3:40pm September 29th 2016 via Twitter for Android in reply to RetroRic79
@RetroRic79 i'll see you here =)
3:13pm September 29th 2016 via Twitter for Android in reply to RetroRic79
@againsthimself @collinrm @gepeto42 register to @Uber using a @FreedomPop number, get SMS in their app. Problem solved :)
8:37am September 29th 2016 via FalconPro3 in reply to againsthimself
RT @koush: Yay Electron. https://t.co/9KKsWS62tW
RT @x0rz: Google Chromium fork removing Google integration and enhancing privacy, control, and transparency https://t.co/YgXB2Cc6bJ #privacy #chrome
Reliable Third-Party Library Detection in Android and its Security Applications - [PDF] https://t.co/QZQwHjTX51
@p3t3_r3c0n not sure if it will be recorded yet
12:43pm September 27th 2016 via Twitter Web Client in reply to p3t3_r3c0n
RT @cryptax: @ikoz @pof the #dockerfile for the #Android #RE image is here: https://t.co/XNcdDanmvU - feel free to adapt & have fun.
RT @jdorfman: I'd you run an #opensource project and need a new logo (pro bono) let me know. It will be the same team behind this: https://t.co/FlgHUlgaMM
RT @duo_labs: Excited to have @pof from @IOActive present our very first London office Duo Tech Talk. https://t.co/Cd1HcULJnh
RT @revskills: CVE-2016-7545 -- SELinux sandbox escape https://t.co/feteaIf7p1
@againsthimself alive in #lacon2k16, still laughing with the latest @StreetFighter news... luckily I play the old SSF2X version \o/
7:11pm September 24th 2016 via Twitter for Android in reply to againsthimself
RT @docvalentine: did some fanart of my favourite character in street fighter 5 definitely the most entertainment i've gotten from th… https://t.co/LbvTWMvzU2
RT @ihackbanme: .@jduck's talk at DerbyCon: Stagefright An Android Exploitation Case Study W/ Release of CVE-2015-3864 in Metasploit https://t.co/4XDRuvhJxM
RT @jduck: Metasploit module for CVE-2015-3864 now available! https://t.co/nOzYBRYDKJ Pull Request: https://t.co/oZAm0FVGuM
RT @Morpheus______: #dextra reverse engineering tool for #dex/#ART fully updated for #Android #N, multi-dex oat, better decompilation https://t.co/kvjYAhPtiU
RT @IOActive: Catch @pof #hacking #superstreetfighter @IOActive #HACKSOHO Sept 29. Come eat, drink, hack & chill in London. https://t.co/G0xG7brYyf
RT @jeffreycrowell: @radareorg is on @whoismrrobot :-) https://t.co/woJbnOXshi
RT @Csdxw47: Saw @radareorg on Mr Robot season two finale scene!! https://t.co/8L7yaJ7J95
RT @d_olex: Why TrustZone is more r/e friendly than System Management Mode: you easily can get all of the SMC handlers list https://t.co/T5NYnrqgUy
RT @IrssiProject: Irssi 0.8.20 is out. This is a security release and we URGE our users to read and RT this link: https://t.co/g0yJs29vku - thank you!
RT @atrox_at: Today at #Raid2016 I presented our work on carrier side IMSI Catcher / Stingray detection https://t.co/1n1tr50KSp https://t.co/hQn5Ib2txX
RT @collinrm: Mobile Security News Update September 2016 https://t.co/MdOLylrvw2 <-- Very Android Heavy
RT @mwrlabs: Just published @trotmaster99's Android Premium SMS warning manipulation vuln advisory: https://t.co/USJPfD15yk
RT @IOActive: @IOActive #HACKSOHO is 29/9 at the London Happy Hacker House. Food, music, video game hacking, oh my. Register today https://t.co/G0xG7brYyf
RT @keen_lab: We pwned Tesla Model S remotely (no physical contact) with a complex exploit chain. All details reported to Tesla. https://t.co/0qtBM2sSKW
RT @doriancussen: Updated notes on Android kernel permissions https://t.co/KVw61JLVXG #AndroidDev
RT @xdadevelopers: AutoMagisk - Automatically disable Magisk's root when certain apps are running - https://t.co/2pJyxAl9oe https://t.co/gQpa1Wty0q
RT @ChainfireXDA: suhide update to v0.51 https://t.co/qjcinfLxJi
RT @opexxx: ipinfo - Searches various online resources to try and get as much info about an IP/domain as p... https://t.co/LCUxgTYVim — Python OSS (o…
RT @xdadevelopers: Android Nougat is now working on the 2009 HTC HD2! #NoExcuses https://t.co/OgB7BPoFc7 https://t.co/C4yWQw7lRc
RT @NCCGroupplc: Blog post: Introducing BLESuite & BLE-Replay: Python Tools for Rapid Assessment of Bluetooth Low Energy Peripherals https://t.co/0b8VaxLnHe
RT @ChainfireXDA: SuperSU v2.78 SR1 (BETA) released - https://t.co/6eJIvKsPGo
@dukebarman sure will check it out, thanks!
2:07pm September 16th 2016 via FalconPro3 in reply to dukebarman
I'll talk about Reversing Super Street Fighter 2X at @IOActive #HACKSOHO on Sep 29. RSVP at https://t.co/ZdnaOBPLO3 https://t.co/8UnZLqc2jY
RT @k3170Makan: Check out fellow @IOActive pirate @pof demonstrating how to reverse engineer classic arcade games at #HACKSOHO https://t.co/jwTxq3nGAc
RT @revskills: Android: racy getpidcon usage permits binder service replacement https://t.co/0LODV2eNYk
RT @thijs_br: Reverse Engineering Xiaomi’s Analytics app | https://t.co/zR2vvjuJKK
RT @evilsocket: working on AndroSwat, a tool to inspect, dump, modify, search and inject libraries into Android processes https://t.co/S3goDqQ68V
RT @natashenka: @jduck 1) Nope, not allowed 2) We'll look into it, thanks 😟
RT @jduck: . @natashenka couple of questions... 1) what about attack via rogue BTS/eNodeB (physical proximity required)? 2) what about TMO AUP?
RT @natashenka: Pleased to announce the Project Zero Prize. 200k prize for Android remote! https://t.co/QhS6JYHkK6
RT @jcase: Project zero drops an android bug a month b4 google could patch the Nexus devices. Love the "no special treatment" https://t.co/2vUP2mjR9x
RT @onceuponanop: If you want free Android kernel 0days, just track Qualcomm's QuIC disclosures. They drop a couple every month: https://t.co/WZckma9D3B
@darkslay3rz autofire detection is only enabled for Super Street Fighter 2X, has never been enabled for RBS. Haters gonna hate anyway.
7:49am September 13th 2016 via FalconPro3 in reply to darkslay3rz
@calil_bfr i usually idle in @FightCade's #ssf2xj room. If someone mentions me I always do a few games when I'm available :)
6:57am September 13th 2016 via FalconPro3 in reply to calil_bfr
Capcom CPS2 Security Programming Guide - https://t.co/emzTnKNBYA thanks @edcrossed, @idcAvalaunch et al. for the awesome reversing job!
RT @radareorg: New blog post about the #r2con at https://t.co/iOMaYL9O2r! https://t.co/tU8faZqQGu
RT @marcus32x: talk shit and meet me at the ATM for a ft10 https://t.co/Pj2MpFQF8s
@OG_09er thanks, glad you liked it :-)
8:34pm September 10th 2016 via Twitter for Android in reply to OG_09er
@mountainmanjed cool, honestly i never looked into CPS3 stuff... but will probably check it out to add support to @radareorg too :)
7:34pm September 10th 2016 via Twitter Web Client in reply to mountainmanjed
@KDav3s bueno, pues 2x en FightCade me sirve :)
7:31pm September 10th 2016 via Twitter for Android in reply to KDav3s
@KDav3s 2x en cps2, cuando quieras :)
7:25pm September 10th 2016 via Twitter for Android in reply to KDav3s
@angealbertini maybe the ones that contain a video got duplicated when converting to pdf :/
7:24pm September 10th 2016 via Twitter for Android in reply to angealbertini
Hacking Street Fighter: CPS2 Encryption in Radare2 at #r2con Slides: [PDF] https://t.co/ZcAxzsKM4M Video: https://t.co/gT89YFbphN
RT @radareorg: Looks like r2 runs on iOS10 too :-) /thx @qwertyoruiopz https://t.co/3eVmQx6fxO
RT @as0ler: Enjoying how @pof hack & play street fighter II using @radareorg at #r2con https://t.co/UsYwD5gdrd
RT @DEYCrypt: Hacking Street Fighter : CPS2 Encryption in radare2 by @pof at #r2con @radareorg https://t.co/eX19WWLpk8
RT @reyammer: My @IEEESSP S&P'16 talk on detecting logic bombs in Android apps is out! Check it out here: https://t.co/xd5TnfIZ1e
RT @radareorg: The slides for the #r2con “Radare from A to Z†slides are now online https://t.co/mYWMHdDlE7
RT @luanderock: Samsung Android Security Updates for September: https://t.co/DpP12N0h8B
RT @kapitanpetko: Official documentation about Android 7's file-based encryption (FBE) https://t.co/o7nOFC8wZw
The cake is a lie :) #r2con @radareorg @trufae https://t.co/V5w16VnJ3P
RT @ProjectZeroBugs: Android - libutils UTF16 to UTF8 conversion heap-buffer-overflow https://t.co/h1PVEPJgD2
RT @claud_xiao: There was an issue of libjhead crash on Android: https://t.co/bIDb26KWVy No idea whether it's related with CVE-2016-3862 @timstrazz
RT @maldr0id: Interesting and very detailed survey about the ELF based #Android #malware https://t.co/hTFABMIVW4
RT @benhawkes: Project Zero blog: "Return to libstagefright: exploiting libutils on Android" by Mark Brand - https://t.co/rFZOsRq8mj
RT @chengjia4574: @ScottyBauer1 @sagikedmi @fisher_the_cell I put the poc of cve-2016-3866 in github https://t.co/0f1NEUrWqx cause it had been disclosed
Keeping Android safe: Security enhancements in Nougat - https://t.co/cTEE99ThMs
RT @anestisb: Seems that Google is preparing another DEX based meta file container named VDEX - https://t.co/9RZ5wrEHDN
RT @kapitanpetko: Android APK v2 signature method, looks much better than JAR: https://t.co/RMNCP7qjFi
RT @jduck: Factory and OTA Images for the September Android Security Bulletin have been added to https://t.co/7KXbTP2gxX Enjoy!
RT @ProjectZeroBugs: Android: debuggerd mitigation bypass and infoleak https://t.co/GDuj15QM9v
RT @timstrazz: Here is the commit that killed all the bugs; TLDR replace c code with java code :D https://t.co/fYXahlNrO1
RT @timstrazz: Security Bulletin seems up now https://t.co/O7dfYu5Je1 with some details on CVE-2016-3862 :D
RT @CopperheadOS: @4Dgifts The recent Linux Security Summit presentation goes into a fair bit of depth on attack surface reduction: https://t.co/W4Is49cSt5.
RT @4Dgifts: Android Bootcamp 2016. "Defense in depth efforts" presentation (header may not be correct) https://t.co/m8aASk3HpF https://t.co/1AIOpRlSrC
RT @4Dgifts: This SafetyNet presentation from Android Security bootcamp is worth a read https://t.co/bkdUabp5hD https://t.co/eIeAoak73E
@benhawkes @laginimaineb congrats! looking forward to see more awesome stuff from you :)
7:00am September 7th 2016 via FalconPro3 in reply to benhawkes
RT @thezdi: Announcing #Mobile #Pwn2Own 2016! Details and info now available. https://t.co/QqDGv0WLlV. Complete rules at https://t.co/8xYBO9MZdR #MP2O
@idcAvalaunch noo... i only own a couple of 2X boards, not much into other games :D
2:53pm September 6th 2016 via Twitter for Android in reply to idcAvalaunch
@idcAvalaunch that is my friend Rocco, owner of the boards :)
2:49pm September 6th 2016 via Twitter for Android in reply to idcAvalaunch
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis - [PDF] https://t.co/NkUNyWg2y3
RT @muellerberndt: Creative #ReverseEngineering on #Android https://t.co/cyI4JliANS https://t.co/akDf2wV7XE
@therealundamned those are from a friend who bought them on a pack from JP. One AvP is already sold and a black HSF2 joined the collection
12:23am September 5th 2016 via FalconPro3 in reply to therealundamned
RT @ChainfireXDA: suhide v0.16 - more fixes - better hiding on Nougat - https://t.co/3yNPUEg03Y
RT @raviborgaonkar: Parse Qualcomm DIAG format and convert 2G, 3G n 4G messages to GSMTAP for analysis in wireshark , from @zecke42 https://t.co/eTpH6iMOVw
@idcAvalaunch @brookgamingfans I raise that! :) https://t.co/dStTdH5BKy
6:39pm September 4th 2016 via FalconPro3 in reply to idcAvalaunch
RT @radareorg: Get ready for the congress! Published #r2con talk descriptions! (not just the titles) https://t.co/qhSMxfrKUX
@brookgamingfans it's a Super Street Fighter II X, original CPS-2 arcade A+B board Japanese version.
8:34pm September 3rd 2016 via FalconPro3 in reply to brookgamingfans
RT @ikoz: Ever wondered how suhide works? My quick writeup: https://t.co/12RljXq7zV https://t.co/LUnX7TnGVr
RT @ChainfireXDA: suhide updated to v0.12 - fixes galore - https://t.co/aWR5wwFFxY
RT @jebdec: We are also publishing our intern's Android lib code matching plugin for JEB, https://t.co/WiWmq927Yx @UncleCat8 https://t.co/1NvM0zv1AD