#reverseengineer kết quả tìm kiếm

how do you trigger that bug? #ida #reverseengineer

syndrowm's tweet image. how do you trigger that bug?
#ida #reverseengineer

Gregor Carmesin (linkedin.com/in/gregor-carm…) from TU Darmstadt showed #OBTS how you can ‘de-mangle’ the magic of Swift’s type metadata, descriptors and naming to make binary analysis actually readable again! #reverseengineer

forensicdave's tweet image. Gregor Carmesin (linkedin.com/in/gregor-carm…) from TU Darmstadt showed #OBTS how you can ‘de-mangle’ the magic of Swift’s type metadata, descriptors and naming to make binary analysis actually readable again! #reverseengineer

#UNSInc is #hiring Jr and Sr #ReverseEngineer - #AndroidMalware On-Site in the following locations: Austin, TX Bothell, WA San Francisco Bay Area #splunk engineer #fireeye engineer #zscaler engineer #delinea professional Reach out to Amanda Olson today @ [email protected]

UNSincjobs's tweet image. #UNSInc is #hiring

Jr and Sr #ReverseEngineer - #AndroidMalware
On-Site in the following locations:
Austin, TX
Bothell, WA
San Francisco Bay Area

#splunk engineer

#fireeye engineer

#zscaler engineer

#delinea professional

 Reach out to Amanda Olson today
@ aolson@unsinc.com

Finally arrived this weekeed is going to very ghidryish 😂😂😂😂. #reverseengineer #ghidra

rcorreiapt's tweet image. Finally arrived this weekeed is going to very ghidryish 😂😂😂😂.
#reverseengineer #ghidra

⛏ A detailed guide on how to use Ghidra to Reverse Engineer Malware Blog: varonis.com/blog/how-to-us… #reverseengineer #infosec

mqst_'s tweet image. ⛏ A detailed guide on how to use Ghidra to Reverse Engineer Malware

Blog: varonis.com/blog/how-to-us…

#reverseengineer #infosec
mqst_'s tweet image. ⛏ A detailed guide on how to use Ghidra to Reverse Engineer Malware

Blog: varonis.com/blog/how-to-us…

#reverseengineer #infosec

Why #Rust is such an issue to #ReverseEngineer? fn main() { let tup = (1337, 3.14, 42); let (x, y, z) = tup; println!("x: {x}"); println!("y: {y}"); println!("z: {z}"); let x = [1, 2, 3]; let one = x[0]; let two = x[1]; let three = x[2]; println!("one: {one}"); ...

mytechnotalent's tweet image. Why #Rust is such an issue to #ReverseEngineer?  

fn main() {
 let tup = (1337, 3.14, 42);
 let (x, y, z) = tup;
 println!("x: {x}");
 println!("y: {y}");
 println!("z: {z}");

 let x = [1, 2, 3];
 let one = x[0];
 let two = x[1];
 let three = x[2];
 println!("one: {one}");
...
mytechnotalent's tweet image. Why #Rust is such an issue to #ReverseEngineer?  

fn main() {
 let tup = (1337, 3.14, 42);
 let (x, y, z) = tup;
 println!("x: {x}");
 println!("y: {y}");
 println!("z: {z}");

 let x = [1, 2, 3];
 let one = x[0];
 let two = x[1];
 let three = x[2];
 println!("one: {one}");
...
mytechnotalent's tweet image. Why #Rust is such an issue to #ReverseEngineer?  

fn main() {
 let tup = (1337, 3.14, 42);
 let (x, y, z) = tup;
 println!("x: {x}");
 println!("y: {y}");
 println!("z: {z}");

 let x = [1, 2, 3];
 let one = x[0];
 let two = x[1];
 let three = x[2];
 println!("one: {one}");
...
mytechnotalent's tweet image. Why #Rust is such an issue to #ReverseEngineer?  

fn main() {
 let tup = (1337, 3.14, 42);
 let (x, y, z) = tup;
 println!("x: {x}");
 println!("y: {y}");
 println!("z: {z}");

 let x = [1, 2, 3];
 let one = x[0];
 let two = x[1];
 let three = x[2];
 println!("one: {one}");
...

"There have been claims for decades, going way back, of actual collaboration between us and them." #ReverseEngineer @TimothyAlberino #ufoX


Basic DLL for Windows written in Assembler to help create your own dynamic linkable libraries and to help #ReverseEngineer the process.

mytechnotalent's tweet image. Basic DLL for Windows written in Assembler to help create your own dynamic linkable libraries and to help #ReverseEngineer the process.

If you don't have what you want, look at your actions first. What are you doing or not doing? Then reverse engineer your beliefs that drive the narrative.  . . . #youdeservethis #actions #reverseengineer #belief #staydriven


Crushing any goal essentially boils down to visualizing, reverse engineering, and executing. ⁣ ⁣ Full podcast now available on all platforms.⁣ ⁣ Let’s get it! 👊🏽⁣ ⁣ #visualize #reverseengineer #execute #mudgilmindset #mambamentality #striveforgreatness #thedrmudgilpodcast


Defining the end goal from the start is key in #SupplyChain processes. #ReverseEngineer your approach: know the outcome, design steps to achieve it, and align actions with the goal. This avoids wasted time or resources and keeps operations streamlined and efficient.

Kerim_Kfuri's tweet image. Defining the end goal from the start is key in #SupplyChain processes. #ReverseEngineer your approach: know the outcome, design steps to achieve it, and align actions with the goal. This avoids wasted time or resources and keeps operations streamlined and efficient.

What can $4K get you on the #darkweb? Quite a bit, including a #ReverseEngineer. See what else we found analyzing the dark web job market 👉 kas.pr/qo7o


#GhidraBytes 0x01: Blinky - We begin with the simple #CPP blinky program to which we will #ReverseEngineer each piece step-by-step in #Ghidra! Read the code and get familiar with the basics.

mytechnotalent's tweet image. #GhidraBytes 0x01: Blinky - We begin with the simple #CPP blinky program to which we will #ReverseEngineer each piece step-by-step in #Ghidra! Read the code and get familiar with the basics.
mytechnotalent's tweet image. #GhidraBytes 0x01: Blinky - We begin with the simple #CPP blinky program to which we will #ReverseEngineer each piece step-by-step in #Ghidra! Read the code and get familiar with the basics.

Gregor Carmesin (linkedin.com/in/gregor-carm…) from TU Darmstadt showed #OBTS how you can ‘de-mangle’ the magic of Swift’s type metadata, descriptors and naming to make binary analysis actually readable again! #reverseengineer

forensicdave's tweet image. Gregor Carmesin (linkedin.com/in/gregor-carm…) from TU Darmstadt showed #OBTS how you can ‘de-mangle’ the magic of Swift’s type metadata, descriptors and naming to make binary analysis actually readable again! #reverseengineer

have the source code. Ghidra is one of those tools that turns complex binaries into readable logic. I made a video for this on my Youtube channel. Below is a quick preview — watch the full breakdown on my YouTube channel! at: youtu.be/y0lPvjmvNAs?si… #Ghidra #ReverseEngineer

i_am_giannis's tweet card. Reverse Engineering a C Program in Ghidra | Step-by-Step Binary...

youtube.com

YouTube

Reverse Engineering a C Program in Ghidra | Step-by-Step Binary...


Intel’s ‘Core Ultra X’ naming scheme? Marketing misdirection meets architecture obfuscation. The ‘X’ now flags IGP inclusion, not exclusion - a flip designed to hide real specs in plain sight. Never trust branding; always reverse it. #TechIntel #ReverseEngineer


#ReverseEngineer Who really sold you down this pike ?


#impulseresponse What is the block diagram of my PFC vis-a-vis visual input? #reverseengineer #ElectricalEngineering #EE

jhazani's tweet image. #impulseresponse What is the block diagram of my PFC vis-a-vis visual input? #reverseengineer #ElectricalEngineering #EE

Pentagon Panics As Trump Illegally Ordered Extra Judicial Killing Of Narco Terrorists #ReverseEngineer #ExtraJudicialKillings #WarCriminal

That’s 👏 Not 👏 How 👏 This 👏 Works 👏. The Pentagon is working—STILL—to make up a legal rationale for slaughtering 11 people, 1,500 miles from America, AFTER THE FACT? WHAT? You can’t do this after they’re dead. That is a crime. That is murder. nytimes.com/2025/09/03/us/…

hissgoescobra's tweet image. That’s 👏 Not 👏 How 👏 This 👏 Works 👏. 
The Pentagon is working—STILL—to make up a legal rationale for slaughtering 11 people, 1,500 miles from America, AFTER THE FACT? WHAT? You can’t do this after they’re dead. That is a crime. That is murder. 

nytimes.com/2025/09/03/us/…


bitchute.com/video/h8wB7pb2… #ReverseEngineer Or maybe , just maybe educate yourself forward Get your simple self in gear You will ONLY learn inside the library #CFR and #Illuminati #1967

VRightResearch1's tweet card. V - 1967 Myron C. Fagan - CFR and Illuminati Pt.3

bitchute.com

V - 1967 Myron C. Fagan - CFR and Illuminati Pt.3


Timing is a leverage play: knowing when to act matters more than how often. Everyone's talking wins and loyalty—I’ll ask the dangerous question: What’s *your* real payoff for believing in someone else’s narrative? Who’s quietly profiting from your faith? #reverseengineer


Basic DLL for Windows written in Assembler to help create your own dynamic linkable libraries and to help #ReverseEngineer the process.

mytechnotalent's tweet image. Basic DLL for Windows written in Assembler to help create your own dynamic linkable libraries and to help #ReverseEngineer the process.

⁣Stack small daily wins to crush big goals. ⁣ ⁣ Full podcast now available on all platforms.⁣ ⁣ Let’s get it! 👊🏽⁣ ⁣ #visualize #reverseengineer #execute #mudgilmindset #mambamentality #striveforgreatness #thedrmudgilpodcast ⁣ ⁣


how do you trigger that bug? #ida #reverseengineer

syndrowm's tweet image. how do you trigger that bug?
#ida #reverseengineer

#impulseresponse What is the block diagram of my PFC vis-a-vis visual input? #reverseengineer #ElectricalEngineering #EE

jhazani's tweet image. #impulseresponse What is the block diagram of my PFC vis-a-vis visual input? #reverseengineer #ElectricalEngineering #EE

⛏ A detailed guide on how to use Ghidra to Reverse Engineer Malware Blog: varonis.com/blog/how-to-us… #reverseengineer #infosec

mqst_'s tweet image. ⛏ A detailed guide on how to use Ghidra to Reverse Engineer Malware

Blog: varonis.com/blog/how-to-us…

#reverseengineer #infosec
mqst_'s tweet image. ⛏ A detailed guide on how to use Ghidra to Reverse Engineer Malware

Blog: varonis.com/blog/how-to-us…

#reverseengineer #infosec

Why #Rust is such an issue to #ReverseEngineer? fn main() { let tup = (1337, 3.14, 42); let (x, y, z) = tup; println!("x: {x}"); println!("y: {y}"); println!("z: {z}"); let x = [1, 2, 3]; let one = x[0]; let two = x[1]; let three = x[2]; println!("one: {one}"); ...

mytechnotalent's tweet image. Why #Rust is such an issue to #ReverseEngineer?  

fn main() {
 let tup = (1337, 3.14, 42);
 let (x, y, z) = tup;
 println!("x: {x}");
 println!("y: {y}");
 println!("z: {z}");

 let x = [1, 2, 3];
 let one = x[0];
 let two = x[1];
 let three = x[2];
 println!("one: {one}");
...
mytechnotalent's tweet image. Why #Rust is such an issue to #ReverseEngineer?  

fn main() {
 let tup = (1337, 3.14, 42);
 let (x, y, z) = tup;
 println!("x: {x}");
 println!("y: {y}");
 println!("z: {z}");

 let x = [1, 2, 3];
 let one = x[0];
 let two = x[1];
 let three = x[2];
 println!("one: {one}");
...
mytechnotalent's tweet image. Why #Rust is such an issue to #ReverseEngineer?  

fn main() {
 let tup = (1337, 3.14, 42);
 let (x, y, z) = tup;
 println!("x: {x}");
 println!("y: {y}");
 println!("z: {z}");

 let x = [1, 2, 3];
 let one = x[0];
 let two = x[1];
 let three = x[2];
 println!("one: {one}");
...
mytechnotalent's tweet image. Why #Rust is such an issue to #ReverseEngineer?  

fn main() {
 let tup = (1337, 3.14, 42);
 let (x, y, z) = tup;
 println!("x: {x}");
 println!("y: {y}");
 println!("z: {z}");

 let x = [1, 2, 3];
 let one = x[0];
 let two = x[1];
 let three = x[2];
 println!("one: {one}");
...

Gregor Carmesin (linkedin.com/in/gregor-carm…) from TU Darmstadt showed #OBTS how you can ‘de-mangle’ the magic of Swift’s type metadata, descriptors and naming to make binary analysis actually readable again! #reverseengineer

forensicdave's tweet image. Gregor Carmesin (linkedin.com/in/gregor-carm…) from TU Darmstadt showed #OBTS how you can ‘de-mangle’ the magic of Swift’s type metadata, descriptors and naming to make binary analysis actually readable again! #reverseengineer

Next Friday at #gmu #georgemasonuniversity, my 3rd guest lecture where we will #reverseengineer a real-world scenario, an #OT #IT #hack on the #powergrid. Using #ghidra and #reverse a stripped binary and undo a #vuln in #bonded and #encrypted #bluetooth #ble #bluetoothlowenergy.

mytechnotalent's tweet image. Next Friday at #gmu #georgemasonuniversity, my 3rd guest lecture where we will #reverseengineer a real-world scenario, an #OT #IT #hack on the #powergrid. Using #ghidra and #reverse a stripped binary and undo a #vuln in #bonded and #encrypted #bluetooth #ble #bluetoothlowenergy.

Basic DLL for Windows written in Assembler to help create your own dynamic linkable libraries and to help #ReverseEngineer the process.

mytechnotalent's tweet image. Basic DLL for Windows written in Assembler to help create your own dynamic linkable libraries and to help #ReverseEngineer the process.

#GhidraBytes 0x01: Blinky - We begin with the simple #CPP blinky program to which we will #ReverseEngineer each piece step-by-step in #Ghidra! Read the code and get familiar with the basics.

mytechnotalent's tweet image. #GhidraBytes 0x01: Blinky - We begin with the simple #CPP blinky program to which we will #ReverseEngineer each piece step-by-step in #Ghidra! Read the code and get familiar with the basics.
mytechnotalent's tweet image. #GhidraBytes 0x01: Blinky - We begin with the simple #CPP blinky program to which we will #ReverseEngineer each piece step-by-step in #Ghidra! Read the code and get familiar with the basics.

#UNSInc is #hiring Jr and Sr #ReverseEngineer - #AndroidMalware On-Site in the following locations: Austin, TX Bothell, WA San Francisco Bay Area #splunk engineer #fireeye engineer #zscaler engineer #delinea professional Reach out to Amanda Olson today @ [email protected]

UNSincjobs's tweet image. #UNSInc is #hiring

Jr and Sr #ReverseEngineer - #AndroidMalware
On-Site in the following locations:
Austin, TX
Bothell, WA
San Francisco Bay Area

#splunk engineer

#fireeye engineer

#zscaler engineer

#delinea professional

 Reach out to Amanda Olson today
@ aolson@unsinc.com

Finally arrived this weekeed is going to very ghidryish 😂😂😂😂. #reverseengineer #ghidra

rcorreiapt's tweet image. Finally arrived this weekeed is going to very ghidryish 😂😂😂😂.
#reverseengineer #ghidra

Tomorrow in our next episode of #GhidraBytes, we will dig into DAT_code_0043 and see what value exists at the value going into that function which is 0x9d! We will need to understanding our hex to binary conversion to make sense of how to #ReverseEngineer this in #Ghidra!

mytechnotalent's tweet image. Tomorrow in our next episode of #GhidraBytes, we will dig into DAT_code_0043 and see what value exists at the value going into that function which is 0x9d! We will need to understanding our hex to binary conversion to make sense of how to #ReverseEngineer this in #Ghidra!
mytechnotalent's tweet image. Tomorrow in our next episode of #GhidraBytes, we will dig into DAT_code_0043 and see what value exists at the value going into that function which is 0x9d! We will need to understanding our hex to binary conversion to make sense of how to #ReverseEngineer this in #Ghidra!
mytechnotalent's tweet image. Tomorrow in our next episode of #GhidraBytes, we will dig into DAT_code_0043 and see what value exists at the value going into that function which is 0x9d! We will need to understanding our hex to binary conversion to make sense of how to #ReverseEngineer this in #Ghidra!

Defining the end goal from the start is key in #SupplyChain processes. #ReverseEngineer your approach: know the outcome, design steps to achieve it, and align actions with the goal. This avoids wasted time or resources and keeps operations streamlined and efficient.

Kerim_Kfuri's tweet image. Defining the end goal from the start is key in #SupplyChain processes. #ReverseEngineer your approach: know the outcome, design steps to achieve it, and align actions with the goal. This avoids wasted time or resources and keeps operations streamlined and efficient.

Loading...

Something went wrong.


Something went wrong.


United States Trends