Tweets from April 2017

RT @ikoz: Google published a table documenting the different use cases triggering the two SafetyNet Attestation flags… https://t.co/Y12HIfIXw1

10:57am April 28th 2017 via Falcon Pro Material

RT @doriancussen: “Hidden Gems of Android O” by @ianhlake https://t.co/0SOL1b1h0M

10:47am April 28th 2017 via Falcon Pro Material

RT @mitp0sh: So, I can now confirm that #nintendo #switch does use libstagefright...interesting thought that was a hoax ;) https://t.co/q8a9rVD48K

10:43am April 28th 2017 via Falcon Pro Material

RT @c0dmtr1x: Here it is: 3rd part of my #Android Hacking with Frida tutorial. @OWASP UnCrackable2 with @fridadotre and @radareorg https://t.co/D1D1NHjkaE

10:41am April 28th 2017 via Falcon Pro Material

RT @evilsocket: Wordlists: 5 Billion Real Leaked passwords into order of most probable - https://t.co/ZAnTZ8BQ6h

10:27am April 28th 2017 via Falcon Pro Material

RT @ihackbanme: First NDays exploits made public. More to come soon. NDAY-2017-0105: EOP Vulnerability in MSM Thermal Driver https://t.co/IdSxWsM4UQ

10:26am April 28th 2017 via Falcon Pro Material

RT @collinrm: Mobile Security News Update April 2017 https://t.co/9Uxds51q3O #flexispy #android sooo many slides

10:18am April 28th 2017 via Falcon Pro Material

RT @koush: put up a new site for windows universal adb drivers. https://t.co/ZPWjLduLwo

5:11am April 27th 2017 via Falcon Pro Material

RT @yan: Manticore, our dynamic binary analysis tool with support for symbolic execution, is now public! https://t.co/SFqwmrNoWL

5:08am April 27th 2017 via Falcon Pro Material

RT @Gummowned: Just finished wiring in the right joycon padhack.I guess this is the first modded switch stick? Includes rumble mot… https://t.co/qNpZrvs7vK

5:25pm April 24th 2017 via Falcon Pro Material

RT @Mobile_Sec: Vulnerability Exploitation and Mitigation in Android: https://t.co/b7IZeSF6fE

6:51am April 22nd 2017 via Falcon Pro Material

RT @iamnion: recordings of first #osmocon (osmocom conference) at https://t.co/4FO0EISEAx

6:44am April 22nd 2017 via Falcon Pro Material

RT @IOActive: Researchers at @IOActive have analyzed Linksys routers and discovered a total of 10 vulnerabilities: https://t.co/N1Dt6X1KHE #Security

6:36am April 22nd 2017 via Falcon Pro Material

RT @x0rz: How attackers were discovered inside a mobile operator during a routine audit https://t.co/lNAbVU3HwY (PDF) Guess w… https://t.co/zr0TvCuAeN

8:43pm April 20th 2017 via Falcon Pro Material

RT @andremoulu: Attacking ARM Trustzone using Rowhammer by @eshardNews (direct link) https://t.co/TGCRWnoqVU

8:17pm April 20th 2017 via Falcon Pro Material

RT @eshardNews: Download eshard's slides on "Attack ARM TrustZone using Rowhammer” presented at IRISA iN Rennes recently https://t.co/pSlH0Ywzuo

8:17pm April 20th 2017 via Falcon Pro Material

RT @muellerberndt: Android Kernel Exploitation Playground HT @Fuzion24 https://t.co/obkQMRQXqC

8:08pm April 20th 2017 via Falcon Pro Material

RT @solardiz: @yung_vats & @_argp's Infiltrate 2017 slides on Android libc heap exploitation, abstract https://t.co/YJ9wDlvSjd PDF https://t.co/2trgV8L1T2

7:45pm April 20th 2017 via Falcon Pro Material

RT @Mobile_Sec: ReDex: An Android Bytecode Optimizer, optimizes .dex bytecode https://t.co/9Sndzq1Ykn by @fbOpenSource

5:31pm April 20th 2017 via Falcon Pro Material

RT @_argp: Slide deck from @yung_vats' and mine @InfiltrateCon 2017 talk "The Shadow over Android": https://t.co/QlsPOLxGif

9:21am April 20th 2017 via Falcon Pro Material

RT @martijn_grooten: How not to do certificate-pinning: trust any certificate for any domain signed by the pinned certificate. Ouch. https://t.co/9S5x72GXmH

7:38am April 18th 2017 via Falcon Pro 2015 BETA

RT @evilsocket: And here you go, in case someone wanna help with OpenSnitch development, I've just opened the repo https://t.co/xIwuRXkmXC (bad q. code)

7:33am April 18th 2017 via Falcon Pro 2015 BETA

RT @Mobile_Sec: Calling JNI Functions with Java Object Args from Cmd Line https://t.co/2XysrqU1ff Great follow-up on https://t.co/gn3QYN4Lik @caleb_fenton

6:40am April 17th 2017 via Falcon Pro 2015 BETA

RT @jcase: Via a 3556x3556 icon this app crashes package installer and systemui on many android devices lol https://t.co/BrtL1LrMMq

6:29am April 17th 2017 via Falcon Pro 2015 BETA

RT @munmap: Abusing one and a half #Chrome features for RCE on Android! You can now check our #CanSecWest slides.… https://t.co/zeKByckjX3

9:40pm April 16th 2017 via Falcon Pro 2015 BETA

RT @caleb_fenton: "Creating a Java VM from Android Native Code" https://t.co/vn6SZGbwbq

9:04pm April 16th 2017 via Falcon Pro 2015 BETA

RT @benhawkes: Project Zero blog: "Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 2)" by @laginimaineb - https://t.co/eukSaSdm1M

8:54pm April 16th 2017 via Falcon Pro 2015 BETA

RT @SpecterDev: I've done a little write-up about the PS4 4.0x exploit. Those more knowledgeable feel free to correct my mistakes :) https://t.co/Ex8PeRy25q

4:00pm April 9th 2017 via FalconPro3

RT @Joshua_Brindle: The Mobile Device Fundamentals Protection Profile is now on github! https://t.co/DKBFBAkw2x for nerds into that sort of thing 🙃🙃🙃

10:21am April 9th 2017 via FalconPro3

RT @teamsik: [AHE17] Qualifying challenges are online for the Android Hacking Event 2017 (CTF). https://t.co/UUPj1YkmVs. Hope to see you all on 7th June!

10:14am April 9th 2017 via FalconPro3

@STRkuroppi cannot load the video from STRevival website, "crossdomain access denied "

5:21am April 8th 2017 via FalconPro3 in reply to STRkuroppi

RT @Goku: Today the father of Dragon Ball turns 62. Happy birthday, Akira Toriyama! RT to show respect! https://t.co/6qJYspClRw

6:59pm April 5th 2017 via FalconPro3

RT @benhawkes: Project Zero blog: "Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1)" by @laginimaineb - https://t.co/mXSgqLDA1v

4:33pm April 4th 2017 via FalconPro3

RT @m0bile_security: With HAXM 6.1.1 you are able to run Android Emulator with Docker, MacOS Framework.hypervisor, and VirtualBox. https://t.co/9NFOODzv6a

4:31pm April 4th 2017 via FalconPro3

RT @Mobile_Sec: Android Security Bulletin April 2017 https://t.co/ToSRELiElR

4:44am April 4th 2017 via FalconPro3

RT @CopperheadOS: Android 7.1.2 adds Android Vendor Test Suite (VTS) with fuzzing infrastructure https://t.co/4l6RBj9xcZ. Can look closely on a less busy day.

4:40am April 4th 2017 via FalconPro3

RT @jcase: TLDR no 0days, only many years old well patched vulns stolen from framaroot https://t.co/ikpA1mM6Yc

4:37am April 4th 2017 via FalconPro3

RT @nicknikiforakis: If your browser extension modifies a page's DOM, then it is likely fingerprintable #Oakland2017 paper with… https://t.co/C1ks3IlNVj

6:59pm April 3rd 2017 via FalconPro3

RT @virqdroid: Mobile Security Research - 2017 Q1 - https://t.co/gCK6wdtKWm

4:03pm April 3rd 2017 via FalconPro3

RT @andremoulu: I'm now officially looking for a new job (remote) in android security :) You can find my resume here https://t.co/NJQPRqhvPi RT appreciated

4:02pm April 3rd 2017 via FalconPro3

RT @m0bile_security: Forensics Investigation of Android Phone using Andriller #MobileSecurity #AndroidSecurity https://t.co/lSRKVR6nVd

8:23am April 2nd 2017 via FalconPro3

RT @newsycombinator: Tunnel TCP Through WebSockets (CLI Tool) https://t.co/N0EBjBEGr3

12:16am April 2nd 2017 via FalconPro3

RT @trufae: My slides for #sue2017 about reverse engineering ARM firmwares (focus on TYT MD380) using @radareorg are now online! https://t.co/Iqwxf3nPuZ

11:40pm April 1st 2017 via FalconPro3

RT @Morpheus______: #Linux/#Android #Jtrace now hooks,not just traces: Using writeProcessMemory, intercept&modify syscalls in plugin.… https://t.co/UX5Ha2

3:05pm April 1st 2017 via FalconPro3

RT @scottyab: Android O prompts for pin/passcode before enabling developer options. Hat tip @Google! (pretty sure this is a new O… https://t.co/5qQB1SrWi3

2:59pm April 1st 2017 via FalconPro3

RT @WEareTROOPERS: #TR17 slides are going online :) You can check them out here: https://t.co/AyfgtrM7xL Keep checking back as we continue to add slides!

10:17am April 1st 2017 via FalconPro3

@timstrazz ouch that suck! glad to hear it's only the motorbike who took damage and you are fine. Be careful on the road :)

10:16am April 1st 2017 via FalconPro3 in reply to timstrazz