78 Followers
75 Following
15 Posts
Former @daubsi at Twitter
Life-long student, sw developer, xennial, digital native, maker, MCU tinkerer, knows a thing about infosec and cannot resist a good ctf.

Less than a week to go in our Rural Tech Fund Golden Ticket fundraiser, and we're quite a ways behind where we were this time last year. We've got a few days left to make up the difference, so I hope more folks will donate and enter!

The money we raise helps us provide technology education opportunities to marginalized and underrepresented groups, along with tech access for students with disabilities. The amount we raise directly impacts how many kids we can help.

To enter, donate $20 to either the RTF or your local food bank, and forward us the receipt. Each $20 donated is another chance to win the golden ticket, and there's no limit on how many entries you can have.

The golden ticket gets you...
- A free seat in every training class I teach
- A free seat in one of my classes to give away
- A free seat in Dragos ICS class + one seat for a friend/coworker
- $500 to spend on any tech/career books you want

You can read all the details here: https://ruraltechfund.org/goldenticket/. Thanks for your support -- it makes a big difference in the lives of so many kids!

Is anyone aware of a *big* model (20 inch+) of the USS Enterprise NCC 1701 D? All I can find are modes of max 10inch? Thanks

@eric_capuano

Try Aper'Solve: https://www.aperisolve.com

It will run an image against zsteg, steghide, outguess, exiftool, binwalk, foremost, strings and pngcheck all at once in one go.

New shirts finally came, yes I buy my own designs, you can too! #DFIR https://www.teepublic.com/user/stark4n6
T-Shirts by stark4n6 | TeePublic

Shop t-shirts, phone cases, hoodies, art prints and mugs created by independent artists from around the globe.

Let me follow with a short #introduction

Hi, I'm Tim Blazytko, also known as mrphrazer.

I'm a binary security researcher and doing #reverseengineering for almost 15 years now. I've done research in the areas of program analysis, fuzzing, bug triaging and code (de)obfuscation. Today, I build obfuscation schemes for embedded devices, do (de)obfuscation research and teach classes in these areas. Most of my research can be found at https://synthesis.to

After 1 week on #Mastodon, the biggest difference I notice compared to #Twitter is the way each network makes me feel.

Twitter:
Open, scroll…
“Why are people so horrible to each other?”

Mastodon:
Open, scroll…
“Wow! There are so many interesting people in the world! I want to know more of them.”

I sense being here is changing my perspective of social media. #TwitterMigration

Mastodon Tip - any emoji or checkmarks, even cool verified ones in someone’s username are just emoji. The blue check verified ones on other servers are custom emoji (techies can see them from that server’s emoji API) but don’t let them stress you out. Instead consider verifying yourself! Add a meta tag (details in the mastodon docs) with a meta tag linked to your profile. This will turn your profile links green. See my profile for an example. This may make you more trustworthy.
New #PEsieve/#HollowsHunter (v0.3.5): https://github.com/hasherezade/pe-sieve/releases/ & https://github.com/hasherezade/hollows_hunter/releases - with some bugfixes & improvements. Check it out!
Releases · hasherezade/pe-sieve

Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches). - hasherezade/pe-sieve

GitHub