Tweets from May 2019

RT @IOActive: Tao Sauvage, IOActive Senior Security Consultant, discloses vulnerabilities in the Asus #ZenFone; ZenUI, messaging,… https://t.co/uBqcrf2daW

10:46pm May 31st 2019 via Falcon Pro Material

RT @jebdec: A blog detailing Google's custom metaresources.arsc binary format and how to parse and generate localized resources… https://t.co/KeWnM1ycIH

4:30pm May 31st 2019 via Falcon Pro Material

RT @mobilesecurity_: Qualcomm Android: kernel use-after-free via incorrect set_page_dirty() in KGSL #MobileSecurity #AndroidSecurity by… https://t.co/fqPOGVkz

10:17am May 31st 2019 via Falcon Pro Material

RT @TDataScience: Using Reinforcement Learning to play Super Mario Bros on NES using TensorFlow https://t.co/L2higbz21J

10:11am May 31st 2019 via Falcon Pro Material

RT @rtlsdrblog: Using a HackRF to Reverse Engineer and Control Restaurant Pagers https://t.co/3pAma7dfeA https://t.co/IhxLX6z5gE

1:10pm May 29th 2019 via Falcon Pro Material

RT @mobilesecurity_: What Role do DeviceCheck and SafetyNet play in App Authentication? Built-in Android and iOS mobile security checks… https://t.co/2LHmXtt

6:45am May 29th 2019 via Falcon Pro Material

RT @mobilesecurity_: TEE Exploitation on Samsung Exynos devices Part 1 - Introduction #MobileSecurity #AndroidSecurity by @bluefrostsec… https://t.co/aeNlkhM2

1:30pm May 27th 2019 via Falcon Pro Material

RT @mobilesecurity_: TEE Exploitation - Exploiting Trusted Apps on Samsung’s TEE #MobileSecurity #AndroidSecurity [SLIDES] by… https://t.co/JllhW2PBj7

1:30pm May 27th 2019 via Falcon Pro Material

RT @bluefrostsec: We just published the slides for the TEE presentation @esanfelix gave at #zer0con2019 and #infiltrate19, and kickin… https://t.co/ZQGz85than

1:28pm May 27th 2019 via Falcon Pro Material

RT @mobilesecurity_: Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnera… https://t.co/P81rmUf

7:50am May 24th 2019 via Falcon Pro Material

RT @jessfraz: One thing that seems to have gotten hidden from the GitHub announcements is actually THE MOST VALUABLE feature for… https://t.co/xzfQw0EHSE

8:32pm May 23rd 2019 via Falcon Pro Material

@KillrMillerTime I like the boxer glitch that allows him to be standing while still keeping down charge https://t.co/deM2cyo4W8

6:56pm May 23rd 2019 via Falcon Pro Material in reply to KillrMillerTime

RT @mobilesecurity_: First official version of Tor Browser for Android released on the Play Store #MobileSecurity #AndroidSecurity https://t.co/ljNlmU4sm9

5:43pm May 22nd 2019 via Falcon Pro Material

How Capcom's clever CPS2 Arcade Game Copy Protection stopped bootleg games - https://t.co/dG9ZnIyin2

5:41pm May 22nd 2019 via Falcon Pro Material

RT @mobilesecurity_: Objection v1.6.4 is out with a new SSL Pinning bypass hook for iOS Cordova applications #MobileSecurity… https://t.co/LfKVy93ftt

4:28pm May 22nd 2019 via Falcon Pro Material

RT @W00Tock: https://t.co/uJiPoONjCM Just started compiling and curating LTE/Cellular Hacking resources, blog next...

5:30am May 22nd 2019 via Falcon Pro Material

@eltroubleSRK @AfroLegends319 ah true! there is no need to whiff the upper rush... should be even easier then :) ta… https://t.co/YNW90SiOA5

7:50pm May 21st 2019 via Twitter for Android in reply to eltroubleSRK

@eltroubleSRK @AfroLegends319 in theory boxer can hold forward for 14 frames between the super motion, see this vid… https://t.co/3J3CK4YQMO

7:30pm May 21st 2019 via Twitter for Android in reply to eltroubleSRK

@eltroubleSRK @AfroLegends319 with an opponent in the corner holding down-back (crouch-block), would this be a vali… https://t.co/JXdIyMFOIh

7:07pm May 21st 2019 via Twitter for Android

RT @raviborgaonkar: Not to forget WiFi IMSI catcher attack can grab IMSI of iPhones even WIFI is disabled similarly..Full paper on WiFi… https://t.co/f0qfVr2R

5:09pm May 20th 2019 via Falcon Pro Material

RT @ChainfireXDA: Example code and docs for Android VM injection (inject your own JVM classes into any VM process, including system_s… https://t.co/MbXvYxNmAg

5:09pm May 20th 2019 via Falcon Pro Material

RT @WydD: Today I'm releasing my latest CPS2 reverse engineering project. In order to find a broken trace on a B-Board I had… https://t.co/TEcqM0yUcd

9:22pm May 17th 2019 via Falcon Pro Material

RT @quarkslab: [BLOG] Android Application Diffing: Analysis of Modded Version by @bla5r and @rh0main https://t.co/j6hI6AUZ1P Defe… https://t.co/PKghQK74ms

4:30pm May 16th 2019 via Falcon Pro Material

RT @cBekrar: In 2018, we've seen 5x more full chains for iOS than Android. Security and mitigations for Android have increased c… https://t.co/OrS2Re9v4x

6:25am May 16th 2019 via Falcon Pro Material

RT @jurajsomorovsky: Based on our TLS-Attacker, we created @Burp_Suite extension which allows you to evaluate TLS configurations:… https://t.co/ZOcnocGNWF

6:33am May 14th 2019 via Falcon Pro Material

RT @kapitanpetko: Apparently, 'adb backup and restore has now been deprecated'. Expect random breakage? Cf. https://t.co/d2zTw1hUYB

3:58pm May 13th 2019 via Falcon Pro Material

RT @mobilesecurity_: Android NVIDIA Pixel C TrustZone CVE-2018-6243 – Memory Corruption #MobileSecurity https://t.co/EfEOYXvZh0

5:03pm May 12th 2019 via Falcon Pro Material

RT @mobilesecurity_: Hacking Public Warning System in LTE Mobile Network #MobileSecurity #HITB2019AMS [SLIDES] by Li Weiguang… https://t.co/eG2DcVjFTt

5:03pm May 12th 2019 via Falcon Pro Material

RT @mobilesecurity_: Hidden Agendas: bypassing GSMA recommendations on SS7 networks #MobileSecurity #HITB2019AMS [SLIDES] by Kirill Puz… https://t.co/dCETscm

5:02pm May 12th 2019 via Falcon Pro Material

RT @ThomasPeyrin: Our paper on chosen-prefix collision attack for SHA-1 is out. TL;DR: computing such collision is very practical, fo… https://t.co/DVaVwajFtm

9:00pm May 10th 2019 via Falcon Pro Material

RT @campuscodi: An RCE exists in SQLite. Unless your app allows attackers to run SQL commands, you're not at risk.… https://t.co/u6HlaVKybP

8:50pm May 10th 2019 via Falcon Pro Material

RT @quarkslab: We are constantly being asked about so-called "secure messaging apps". Here is a quick overview https://t.co/VqcmskROcJ

8:18pm May 10th 2019 via Falcon Pro Material

RT @mobilesecurity_: In a Bind? Android’s Binder – in depth #MobileSecurity #AndroidSecurity [SLIDES] by @Morpheus______… https://t.co/azIG6GiEFO

8:16pm May 10th 2019 via Falcon Pro Material

RT @mobilesecurity_: Nailgun: Break the privilege isolation in ARM devices #MobileSecurity #AndroidSecurity PoC #1: Reading Secure Confi… https://t.co/p4UtYJb

8:16pm May 10th 2019 via Falcon Pro Material

RT @mobilesecurity_: Understanding the Security of ARM Debugging Features #MobileSecurity #AndroidSecurity [PAPER]… https://t.co/evRGRr88kl

8:16pm May 10th 2019 via Falcon Pro Material

RT @Morpheus______: Man. You think you’ve fully figured out #binder, then #Android #Q brings version 9 with BC_[TRANSACTION/REPLY]_SG a… https://t.co/TPY15h

7:26am May 10th 2019 via Falcon Pro Material

RT @trufae: As usual, after every talk, it’s time to publish the slides of my @radareorg presentation at @ArkC0n… https://t.co/IDOcmjrQKU

7:05pm May 9th 2019 via Falcon Pro Material

RT @AndroidPolice: Samsung leaked SmartThings source code and keys used to sign mobile apps https://t.co/G66G3a5ohn https://t.co/PigT920Tlb

3:28am May 9th 2019 via Falcon Pro Material

RT @AndroidDev: 𝐏𝐫𝐨𝐣𝐞𝐜𝐭 𝐌𝐚𝐢𝐧𝐥𝐢𝐧𝐞 updates core OS components similar to how we update apps: through Google Play. Thi

11:50pm May 8th 2019 via Falcon Pro Material

RT @AndroidPolice: Android Q beta 3 can show WiFi passwords in plain text https://t.co/WqU13rXzML https://t.co/6S9rIgENHk

11:41pm May 8th 2019 via Falcon Pro Material

*First: HTC Blueangel (i-mate PDA2k) *Favorite: HTC Hermes (aka HTC TyTN) the best one was the white colored Japane… https://t.co/3oKfn4aF7U

11:37pm May 8th 2019 via Falcon Pro Material

#563870 CVE-2019-5765: 1-click HackerOne account takeover on all Android devices, simple bug which allowed to dump… https://t.co/fBf8BBuTuZ

1:13pm May 8th 2019 via Falcon Pro Material

RT @AndroidPolice: Project Mainline offers Android Q modular security updates without requiring a reboot https://t.co/uXgBslK8dE https://t.co/cpxqMuynD2

6:56am May 8th 2019 via Falcon Pro Material

RT @caleb_fenton: Check out the new APKiD release (PEiD for Android) - https://t.co/szbQkdcWVj #malware #android #Yara Big thanks to… https://t.co/IGOYaERTCA

6:31am May 8th 2019 via Falcon Pro Material

¯\_(ツ)_/¯ Get the APK from github if interested... https://t.co/qcJQ22NJ4c https://t.co/wOegw58cok

5:24pm May 7th 2019 via Falcon Pro Material

RT @ChainfireXDA: Injecting native code into arbitrary Android processes with root is old hat, why not inject Java(/Kotlin) into any… https://t.co/BlND4zTwL2

1:43pm May 7th 2019 via Falcon Pro Material

RT @mobilesecurity_: Dexcalibur - an automatic DBI tool for Android powered by Frida with a GUI #MobileSecurity #AndroidSecurity by… https://t.co/kfyRDeAShs

7:20am May 7th 2019 via Falcon Pro Material

RT @AndroidDev: Overview of Privacy Changes in Android Q https://t.co/WBdPhQW1hg

4:41pm May 6th 2019 via Falcon Pro Material

RT @halvarflake: Clarification for the mitigation discussion: I do not think mitigations are all useless. Shipping the combo of NX,… https://t.co/ZffU8urBmZ

10:08am May 6th 2019 via Falcon Pro Material

RT @marcograss: Slides for me and @chenliang0817 talk at @InfiltrateCon 2019. 2PAC 2Furious: Envisioning an iOS compromise in 2019 https://t.co/xeV87QWHOJ

11:12pm May 4th 2019 via Falcon Pro Material

RT @PaulOBrien: This is nice. Chrome Extensions on mobile. https://t.co/JiJroc18q9

11:10pm May 4th 2019 via Falcon Pro Material

RT @cryptax: Just came across this nice piece of work hooking #Android native libraries with #Frida: https://t.co/9Ozje3x4ia

9:29am May 3rd 2019 via Falcon Pro Material

RT @grufwub: just because you can, absolutely does not mean you should https://t.co/wJsWURhDzC

9:03am May 3rd 2019 via Falcon Pro Material

RT @bla5r: The second part of the blog series is out. It is about how to investigate a security patch through application diff… https://t.co/BomGgXmmLF

8:01am May 3rd 2019 via Falcon Pro Material

@therealundamned Progear conversion to ssf2xj conversion, on donor CPS2 without daughterboard I bought cheap. I'm k… https://t.co/YWjGIVHVNo

4:22pm May 2nd 2019 via Twitter for Android in reply to therealundamned

Conversions.... you gotta love 'em #ssf2x https://t.co/1BLEHeSSWo

2:15pm May 2nd 2019 via Twitter for Android