RT @RedNagaSec: Hacking with dex-oracle for Android Malware Deobfuscation - https://t.co/U8KsXnBF1D
RT @FightCade: The new Fightcade is here! Closed beta is live for accounts opened on 2014, coming to newer accounts soon. Download… https://t.co/BUaOzNet6G
@XSPR_DARU because the byte that changes from 00 to 07 is the 3rd, see picture (sorry for the poor quality, made on… https://t.co/00x552y9Zy
4:12am October 26th 2017 via Twitter for Android in reply to XSPR_DARU
RT @collinrm: Mobile Security News Update October 2017 https://t.co/2l9zRNqNQY #android #ios a bunch to read
@rene_mobile @Google @Android Congrats Rene!
7:44am October 24th 2017 via Falcon Pro Material in reply to rene_mobile
RT @LiveOverflow: If theory in university seems useless and too abstract, read this. It's not difficult, and bridged the gap for me… https://t.co/pksdiuAjyf
RT @lorenzoFB: Def Con has finally published the video of the talk by the hacker who survived 20 years by hacking video games. https://t.co/2hP3INT84v
RT @jake_valletta: I recently published a Python module/script for parsing compiled "file_contexts.bin" SEAndroid files. See more: https://t.co/ucVOtodBVm
RT @infoconorg: NEW Rainbow Table added: GSM A5/1 table, 1.52 Terabytes in size. Torrent now available https://t.co/eE8eyOiFOR
RT @mobilesecurity_: Bypassing Android Certificate Pinning with @fridadotre #MobileSecurity #AndroidSecurity https://t.co/qpukgLn4B2 https://t.co/VCHajbtnfQ
RT @BlackHatEvents: Inside "SafetyNet," the primary platform used by Google to check the Android ecosystem by @ikoz & @collinrm at #BHEU https://t.co/58MMOY
RT @avgrygoriev: Samsung announced it's Secure OS for Mobile Devices https://t.co/MoPhiLycJ8 #teegris #samsung #trustzone #teeos… https://t.co/T3hQZZPlEQ
RT @cryptax: My demo at #VB showing how to step debug Android riskware with #CodeInspect: https://t.co/QbUQpBWrWb
RT @AndroidTamer: Oppo/Oneplus .ops Firmware decrypter [Windows Only] #frida https://t.co/6mHJBm4dF1
RT @therealundamned: 15 Pin D-Sub has been a standard controller interface for arcade gear since Neo Geo. There are many variations, so… https://t.co/kHmiJ8OB
@marianorajoy @UNHumanRights shame. shame. shame. #LliberatJordis https://t.co/0bCIZthRTK
6:30am October 17th 2017 via Twitter for Android in reply to marianorajoy
RT @anestisb: Released stable version of the Vdex unquicken decompiler. Bonus integrated Dex bytecode disassembler. https://t.co/MDsPFePWE6
RT @ryf_feed: Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys [pdf] https://t.co/K6ZTPOxlnH
@_bazoukha we missed you and your brother at @X_Street_Battle
8:22am October 15th 2017 via Falcon Pro Material in reply to _bazoukha
RT @jcase: Ok, its been long enough, hope yall fixed it all. My "Backdoors, Bugdoors, frontdoors" slide https://t.co/vPTGZnCEvk
RT @kusumondo: Spain players yogaboy(blanka) Marcade(honda) POF(boxer) https://t.co/Dr7wI58hf5
At #xsb with @kusumondo Honda, the legend :) 🤚🤚🤚 https://t.co/vjFgzXq03Y
RT @StevenJCrowley: eSIM explainer from the latest NTT DOCOMO Technical Journal https://t.co/8sg4sL3FuS
RT @reyammer: Code diff: https://t.co/cJYREYpoD4 It's insane how in 2017 we still don't have secure impl of well-known algos
RT @reyammer: whao, latest Android sec patch fixed critical/RCE buffer overflow in stagefright's base64 decoder (all 4.4.4~>8.0 affected) CVE-2017-0809
RT @AndroidDev: Today, we're excited to announce availability of the #Android Instant Apps SDK 1.1 Read our blog here ↓ https://t.co/elGIk2L3I5
RT @HackingLliure: @UniBarcelona @radareorg Also thanks to @pof who wrote them some years ago. They are still great exercices in order to learn the basics.
RT @HackingLliure: @UniBarcelona @radareorg You can download these great crackmes here: https://t.co/unGwQthVLq
RT @HackingLliure: In the Reverse Engineering demo of our presentation at @UniBarcelona we used @radareorg to solve a simple crackme.
@XSPR_DARU no, it crashed iirc. Maybe you can use something from gd.dll? or maybe @mountainmanjed or @TheRealPasky know a better way
6:04am October 12th 2017 via Twitter for Android in reply to XSPR_DARU
RT @Nav_Arcade: My friend Pau @FightCade having fun the last weekend in @RetroBarcelona 2017. @Nav_Arcade made a very nice setup o… https://t.co/zpUJdASKoj
RT @securelyfitz: Trickle down espionage - $25 COTTONMOUTH/TURNIPSCHOOL cable w/ gsm location & audio exfil... @NSAPlayset… https://t.co/tZjHe3TnAa
RT @StegoPax: Identifying & Avoiding Android app Protections - Talk by @timstrazz @Bugcrowd LevelUp 2017 https://t.co/Qd9vzIZrwK
RT @fractalwrench: Playing APK Golf - how small do you think an Android APK can go? https://t.co/iQ7ZeIuAIC #AndroidDev #perfmatters
RT @AndroidPolice: SamFAIL roots Snapdragon Galaxy Note8 without tripping Knox https://t.co/i3llYQGL93 https://t.co/mDS5kpibJq
RT @mobilesecurity_: Android Reverse Engineering tools #MobileSecurity #AndroidSecurity SLIDES by @cryptax @Fortinet… https://t.co/sSn7ZxU6HS
RT @AndroidPolice: Xposed Framework now available for Android 7.0/7.1 Nougat https://t.co/hrmuupUBMj https://t.co/DUB466pk98
RT @anestisb: Released the first version of an Android vdex standalone parser tool. For now it supports dex dumping. https://t.co/MDsPFePWE6
RT @mobilesecurity_: Understanding new APK Signature Scheme V2 #MobileSecurity #AndroidSecurity https://t.co/TKWELUjqyY
RT @AndroidTamer: A W.I.P. Android Security Reference (largely private notes of @doriancussen ) https://t.co/JbhSWjZogD Contributions are welcome.
RT @timstrazz: Nice work on some IDA Pro + Dalvik goodness :D Love seeing other people doing work in the area and open sourcing it! https://t.co/FVE9oXt5HY
Chainfire open sourced Suhide :D https://t.co/vcw9BS3RqB
RT @ChainfireXDA: I dropped some sauce https://t.co/o3WVXFSxc5
RT @InfosecurityMag: Learn the steps you can take to ensure minimum impact when apps are tampered with https://t.co/LWWeBBQJd3 @pof… https://t.co/7BPZmS9Eq4
RT @CopperheadOS: Treble goes beyond what the SELinux policy language can describe: https://t.co/UCap9baDgv. Treble made SELinux muc… https://t.co/bzHmNFWvMk
RT @aprilmpls: The @Mozilla Observatory now has a CSP Analyzer to help you understand your policy. Lemme know if you find bugs! https://t.co/1oSbp3dYEy
RT @x0rz: Exposing server IPs behind CloudFlare via scanned SSL/TLS certificates https://t.co/kYoDr84AGg #cloudflare #leak
RT @AndroidPolice: The Pixel 2 and Pixel 2 XL will support both eSIM and nanoSIM https://t.co/I0ka71Q8c6 https://t.co/o897yuzlUJ
RT @JRRaphael: More details about the Pixel 2 eSIM thing: https://t.co/PkUAXezThX
RT @JRRaphael: Here's an interesting little Pixel 2 tidbit that didn't get much (any?) attention during the event: https://t.co/Zchz95S84p
RT @Zerodium: We've published the list of mobile vendors for which we currently acquire #0day exploits. We accept both vendor spe… https://t.co/ZCaR4207P5
RT @EFF: The Spanish government's Internet censorship around the Catalonian referendum violated global human rights norms. https://t.co/eLegzBulep
RT @ChainfireXDA: Announcing my retirement from developing SuperSU https://t.co/w1N84jn6KJ
RT @collinrm: SeLinux in Android O ... slides https://t.co/Sc9gKhteEJ