javiermunhoz.com
Old Habits Die Hard - Madrid/Root3d CON'2012
http://javiermunhoz.com/blog/2012/03/12/madrid-root3d-con2012.html
Old Habits Die Hard. Just another scalable weblog. By Javier on 12 March 2012 11:00 PM. Just blogging a quick post after caming back from Root3d CON. This year I have to congratulate speakers again. They shared another year interesting ideas and good technical hacks. I would say this CON speaks loud and clear about the global security scene and the industry around it too. Congrats guys! As you see, it was all about technical moments although meeting Nico Waisman. Was an enjoyable moment too ;). This expl...
aaortega.blogspot.com
A.A.Ortega: test
http://aaortega.blogspot.com/2010/06/test.html
Monday, June 21, 2010. Blabla moving my old site. Big brother is watching. Subscribe to: Post Comments (Atom). Virtex Linux, my distro. Eccchain, thesis project. There was an error in this gadget. Gendarmería no pide disculpas. How to clean up your Twitter account. Black Hat USA 2014 – Computrace backdoor revisited. La pilita de Gutes. Onapsis Adventure en Ekoparty 2013. Ret2libc - Reverse Engineering and related. Hacking Coradir STB CDR1000D HDTV Receiver. Remember, remember the 5th of November.
breakingcode.wordpress.com
WinAppDbg 1.5 is out! | Breaking Code
https://breakingcode.wordpress.com/2013/12/20/winappdbg-1-5-is-out
December 20, 2013. WinAppDbg 1.5 is out! 8212; Tags: ctypes. 8212; Mario Vilas @ 7:45 pm. The WinAppDbg python module allows developers to quickly code instrumentation scripts in Python under a Windows environment. The intended audience are QA engineers and software security auditors wishing to test / fuzz Windows applications with quickly coded Python scripts. Several ready to use utilities are shipped and can be used for this purposes. What’s new in this version? In a nutshell…. Libdisassemble: http:/ ...
aaortega.blogspot.com
A.A.Ortega: August 2008
http://aaortega.blogspot.com/2008_08_01_archive.html
Tuesday, August 5, 2008. Google Android Debugging Utilities. Here are some gnu apps that I have compiled to ease the debugging of binary files on the android platform. I am making available the pre-compiled binaries, the source for this apps are already available and the compilation process is pretty straightforward, once you have the cross-compiler, I used the codesourcery arm-none-linux toolchain http:/ www.codesourcery.com/sgpp/lite/arm/portal/release644:. Steps to crosscompile gdb:. GNU gdb 6.7.
breakingcode.wordpress.com
A Python example on finding connected components in a graph | Breaking Code
https://breakingcode.wordpress.com/2013/04/08/finding-connected-components-in-a-graph
April 8, 2013. A Python example on finding connected components in a graph. 8212; Tags: algorithms. 8212; Mario Vilas @ 10:30 pm. Today I’ve been coding a solution for a problem we’ve encountered with @ggdaniel (cr0hn). During the development of GoLismero 2.0. It called for an implementation of an algorithm to find connected components. In an undirected graph. You can find the source code at the bottom of this post. A graph algorithm a day keeps the CS doctor away…. Suppose we have an undirected graph.
aaortega.blogspot.com
A.A.Ortega: Google Android Debugging Utilities
http://aaortega.blogspot.com/2010/06/google-android-debugging-utilities.html
Tuesday, August 5, 2008. Google Android Debugging Utilities. Here are some gnu apps that I have compiled to ease the debugging of binary files on the android platform. I am making available the pre-compiled binaries, the source for this apps are already available and the compilation process is pretty straightforward, once you have the cross-compiler, I used the codesourcery arm-none-linux toolchain http:/ www.codesourcery.com/sgpp/lite/arm/portal/release644:. Steps to crosscompile gdb:. GNU gdb 6.7.
breakingcode.wordpress.com
Converting shellcode to executable files using InlineEgg | Breaking Code
https://breakingcode.wordpress.com/2010/01/18/quickpost-converting-shellcode-to-executable-files-using-inlineegg
January 18, 2010. Converting shellcode to executable files using InlineEgg. 8212; Tags: inlineegg. 8212; Mario Vilas @ 7:42 pm. Today I found this through Twitter. A web service to convert shellcode to executable files. Here’s the link to it: http:/ sandsprite.com/shellcode 2 exe.php. Then I thought: hey, why do we have to send our beautiful shellcodes to someone else on the Internet when we can do it all locally? So I whipped up this quick Python script using CORE’s InlineEgg. LIABLE FOR ANY DIRECT, IND...
jiffydebian.blogspot.com
Jiffy_debian: 2009-12
http://jiffydebian.blogspot.com/2009_12_01_archive.html
35 个你也许不知道的 Google 开源项目. Sent to you by l5g via Google Reader:. 35 个你也许不知道的 Google 开源项目. 65288;大部分都是利用它们的API来完成), 本文将列举一些有趣的开源项目,其中很可能有不少你不知道的哦。 Things you can do from here:. Subscribe to cnBeta.COM. Get started using Google Reader. To easily keep up with all your favorite sites. Sent to you by l5g via Google Reader:. 25171;游戏的三个境界. Via 玩聚SR 最佳. By 学而时嘻之 on 12/24/09. 一位大师给他的新徒弟解释"道"。"道存在于所有软件之中,不管是多么渺小的软件," 大师说。 手持计算器中有道么?" 徒弟问。 有道," 大师回答。 游戏中有道么?" 徒弟继续问。 65292;" 大师说。 那么 DOS 操作系统里也有道么?". 杀死一个怪物之前,...
aaortega.blogspot.com
A.A.Ortega: Talks and articles
http://aaortega.blogspot.com/p/talks-and-articles.html
Talks and articles that I authored or contributed. EkoParty 2009 - Deactivate the Rootkit (full talk) - English (PDF). BlackHat 2009 - Deactivate the Rootkit - English (Videos Paper PDF tools). Syscan 2009-CanSecWest 2009 - Persistent Bios Infection - Slides - English. Phrack #66 - Persistent Bios Infection - Article - English. Ekoparty 2008 - SmartPhones (in) Security - Español. Ekoparty 2008 - SmartPhones (in) Security - English. BlackHat-Defcon 2007 - OpenBSD Remote Exploit - English.
SOCIAL ENGAGEMENT