alkalinesec Profile Banner
πšŠπš•πš”πšŠπš•πš’ Profile
πšŠπš•πš”πšŠπš•πš’

@alkalinesec

Followers
3K
Following
10K
Statuses
2K

mobile security / symbolic execution. opinions are mine. @[email protected] . he / him

__PAGEZERO
Joined October 2019
Don't wanna be here? Send us removal request.
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
3 years
radius is a new symbolic execution and taint analysis framework written in Rust. It is the fastest* symbolic execution tool for binaries** and aims*** to be a complete and useful utility**** for reverse engineering and fuzzing. Try it out!
12
98
394
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
19 days
this is my best and final tweet. im on the other site with the same username
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
19 days
everyone is worried about RJ45 adapters when the obvious real threat is external drives for CDs. these devices do not even need to be backdoored to pose a significant risk to the user. an attacker in physical proximity to the victim can say "You like CDs? How would you like to C
0
0
3
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
19 days
everyone is worried about RJ45 adapters when the obvious real threat is external drives for CDs. these devices do not even need to be backdoored to pose a significant risk to the user. an attacker in physical proximity to the victim can say "You like CDs? How would you like to C
3
1
17
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
25 days
i finally got around to reading and damn it is so cool that @__sethJenkins was likely able to reverse engineer the exploit mechanism cuz of a stray timestamp in a panic log
0
11
64
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
29 days
RT @atc1441: It finally happened, found a full buffer overflow + exploit for the first timeπŸ₯³ The target, The Signed OTA of the Xiaomi Ther…
0
103
0
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
RT @natashenka: Just unrestricted an issue that shows a fun new attack surface. Android RCS locally transcribes incoming media, making vuln…
0
105
0
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
action movie hacking montage but its just me staring into space for 6 hours trying to think of what to do with this primitive
0
1
29
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
RT @khronokernel: For some inexplicable reason, Apple deemed it safe to give me the Endpoint Security entitlement. Thus my first action as…
0
6
0
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
*hackers in 2027 prolly*: pwned
Tweet media one
@moyix
Brendan Dolan-Gavitt
1 month
Duck typing? You're thinking too small. With AI, we can finally take Guido van Rossum's dream to its logical conclusion
Tweet media one
0
0
5
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
@moyix yeah 4o with name=NaN says No without the single quotes. also itll sometimes say No with name='float(nan)'
Tweet media one
0
0
1
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
RT @MsmCode: Ghidralib development continues: py3 support, binary/asm patching, and symbolic propagation: I also w…
0
1
0
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
RT @laomaiweng: Armed with the forbidden knowledge hidden in the message, Morriss went on to create the Morriss Worm, a subterranean creatu…
0
1
0
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
RT @PokemonGems: aww
Tweet media one
0
1K
0
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
the code, like the rest of the "Content" churned out by this account, is entirely written by claude
Tweet media one
Tweet media two
0
0
11
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
added some more CTF challenge examples to this repo recently
1
6
44
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
2 out of 4 of the rev challenges in AlpacaHack Round 8 can be solved with radius2 using a mergepoint in the flag check loop
Tweet media one
0
1
37
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
@lumc_ radius2 is a symbolic execution engine like angr, but it emulates instructions using r2's ESIL whereas angr uses VEX. with the merge point and -z radius2 can actually solve this in <3s
Tweet media one
0
0
1
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
RT @R00tkitSMM: SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon
0
22
0
@alkalinesec
πšŠπš•πš”πšŠπš•πš’
1 month
RT @DiracGhost: ''Gauge Theories and Fiber Bundles: Definitions, Pictures, and Results'' by Adam Marsh, is the best visual primer in the bu…
0
78
0