Alexandre Borges(@ale_sp_brazil) 's Twitter Profile Photo

In some situations during vulnerability research I've found functions flagged as functions of no return, so it may be useful to remember how to identify them and, eventually, fix problems. This picture is just a quick review.

In some situations during vulnerability research I've found functions flagged as functions of no return, so it may be useful to remember how to identify them and, eventually, fix problems. This picture is just a quick review.

#idapro #vulnerability #reverseengineering
account_circle
/ˈziːf-kɒn/(@x33fcon) 's Twitter Profile Photo

🔍 Ready to shed light on vulnerabilities? Join clearbluejar's training at x33fcon! Learn to analyze real-world Windows and Android vulnerabilities, progressing from knowing about CVEs to understanding their root cause. x33fcon.com/#!t/JohnMcInto…

🔍 Ready to shed light on vulnerabilities? Join @clearbluejar's training at x33fcon! Learn to analyze real-world Windows and Android vulnerabilities, progressing from knowing about CVEs to understanding their root cause. x33fcon.com/#!t/JohnMcInto… #Cybersecurity #ReverseEngineering
account_circle
Overtime Parts(@OvertimeParts) 's Twitter Profile Photo

Harness the potential of reverse engineering with our meticulous process, seamlessly converting your current part into a precise digital model while maintaining its original geometry.

Harness the potential of reverse engineering with our meticulous process, seamlessly converting your current part into a precise digital model while maintaining its original geometry.

#ReverseEngineering #DigitalModeling #PartConversion #GeometricReplication #EngineeringProcess
account_circle
Bernardo Quintero(@bquintero) 's Twitter Profile Photo

Excited to share my new post on how Gemini 1.5 Pro can now analyze entire binaries, offering a new & scalable approach to threat detection.

Working on producing these reports at scale - stay tuned!

cloud.google.com/blog/topics/th…

account_circle
Central Scanning Ltd(@CentralScanLtd) 's Twitter Profile Photo

Unlock the secrets of reverse engineering with Central Scanning!

Starting with 3D scanning, we shape detailed CAD models, transforming physical objects into digital masterpieces.

Learn more - central-scanning.co.uk/reverse-engine…

Unlock the secrets of reverse engineering with Central Scanning! 

Starting with 3D scanning, we shape detailed CAD models, transforming physical objects into digital masterpieces. 

Learn more  - central-scanning.co.uk/reverse-engine…

#ReverseEngineering #3DScanning #CentralScanningInnovation
account_circle
GoEngineer(@GoEngineer) 's Twitter Profile Photo

It's hard to get much bigger than a 747 and the , so we wanted to put the Leo from Artec 3D | Professional 3D solutions through its paces. Check out it even picks up the discoloration on the final scan!
Discover the Artec Leo: hubs.la/Q02w1J2h0

account_circle
iReal 3D(@3dIreal) 's Twitter Profile Photo

🚘 This article delves into the role played by scanners, leveraging their swift data capture, adaptability of various materials, and precision to meet the multiple demands of the automotive sector.



ireal3dscan.com/case/ireal-3d-…

account_circle
ObjectSecurity(@objectsecurity) 's Twitter Profile Photo

Hello! Check out ObjectSecurity's new blog post 'You Should be Automating Binary Reverse Engineering: Here’s Why.' (24 April 2024) bit.ly/3WfyPoP - enjoy!

account_circle
ObjectSecurity(@objectsecurity) 's Twitter Profile Photo

Hi! Check out ObjectSecurity's new blog post 'You Should be Automating Binary Reverse Engineering: Here’s Why.' (4/24/24) bit.ly/44eFQba - enjoy!

account_circle
OnHexGroup(@onhexgroup) 's Twitter Profile Photo

قسمت اول از فصل دوم ، دوره ی رایگان مهندسی معکوس نرم افزار منتشر شد.
در این قسمت نگاهی به زبان انداختیم.

youtu.be/LpRRj_w45ao

account_circle
ObjectSecurity(@objectsecurity) 's Twitter Profile Photo

Hi! Check out ObjectSecurity's new blog post 'You Should be Automating Binary Reverse Engineering: Here’s Why.' (24 April 2024) bit.ly/4aPmJqB - enjoy!

account_circle