Morning all!
Within Ida pro function arguments are displayed as arg #. Arg 0 is the first argument, arg 4 the second and arg 8 the third and so on.
@leightrinity
Low level programmer. Exploit dev. Malware dev. Reverse engineering. Board of directors Malware village. Advisor Canadian Center for Access to Cybersecurity/Technologies Centre canadien d'accès à la cybersécurité et aux technologies
Morning all!
Within Ida pro function arguments are displayed as arg #. Arg 0 is the first argument, arg 4 the second and arg 8 the third and so on.
Those who didn’t catch my workshop at DEFCON; I’ll be teaching at Bsides Ottawa in November. 🙂♥️
Check out the workshop info here: bsidesottawa.ca/feature-even...
Good to see you again!
I'm working on a real life unreported format string vuln this coming week. It's been fixed in the latest release so I wanna have a look. I've downloaded the binaries and will diff these with Diaphora while without internet this week. I'll see if I can weaponize it in any way.
I’m not politically active so I’ll be going to DEFCON. Trans woman too. I think the chances of being detained is pretty minute.
Thanks brother! Gonna be a lot of fun.🙂
Sold out and joined corporate.😁Now on the board of directors for World cyber health and Malware village.😉
That bunny gets up to some bad ass exploiting.🙂♥️
Trying but it’s going really slow here fr some reason.
Exploited a pre authorization buffer overflow in a sync breeze server this am.🙂♥️I am learning so much and am becoming more dangerous by the day!🙂
Day *:22% complete!
I’m currently buried in offensive security exploit development. However I’m gonna be devoting saturdays to releasing a video in my new course series on binary exploitation. youtu.be/7TfQHOj0OGM?...
Pre ordered today!🙂♥️
18C out!! Finally bare leg season!! That was a lonnnngggg winter.🙂♥️
Thanks! Fell in love with them. Just did 7km and they feel great!🙂
I refuse to buy American. My workout gear is getting really tattered. North face has been my go to brand for my walking. Replaced with German company Puma instead. 🙂♥️🇨🇦
Boycotting America has been pretty easy so far. Maybe even a bit of fun.🙂
Morning all! 😊Learned about a nifty little ruby script in Metasploit to grab opcode of gadgets. You can then use that opcode to search LIBSPP.DLL with WInDbg. Pretty neat!😍
I normally used Ropper on the Libc library in Linux. Still learning a lot about windows.🙂Same basic concepts though.🥰Very fun!
Iceberg.🥶🥶🇨🇦
OSED while home alone,🙂♥️nothing too challenging in this course. It’s more about resume building,🙂
I start my OSED offsec security exploit developer tomorrow. Don’t look like any surprises on the syllabus.However anytime I get the privilege to see another hacker work; I learn shit.🙂♥️Plus 2025 is my year of resume building. As a hacker I didn’t care. Now…$$$🥰🙂
For all those who Can't afford 13,000 Canadian dollars for Stephen Sim's Classes on exploit dev!! Slowly building out my training program for some conferences this year. Will be at DEFCON if they allow trans women into the USA by then.🙃
www.youtube.com/watch?v=7TfQ...
I don’t care if he’s a tech bro. I’m just removing my dollars from America period.
Replaced Dropbox with a Canadian cloud service and replaced Apple Music with Spotify as it’s Swedish.🙂♥️🇨🇦
Why did I build up my whole following on a platform that’s turned far right?
New video for anyone wanting a introduction to binary exploitation. We walk before we run! The stack demystified part 2
youtu.be/OUDhS9zoSQI?...
Thank you brother!! Slowly building up over here.🙂
Working on a new AI project with Malware village.🙂Setting up known ransomware group wallets to search through as someone reports an incident via the artificial intelligence.
First meeting of Malware village. Doing some planning on events and some exciting projects we are all working on together. The enthusiasm is contagious.
Duck for super 🙂
Video on stack creation and finding variables and inputs on the stack.
youtu.be/u0Am456IJIE?...