Being a good daddy and a nice person to have a talk with is what I can do best, but let me say an hello in a couple of different ways i know.
public static void helloVisitor(String visitorName) {
System.out.println("Hello " + vistorName);
}
function helloVistor(vistorName) {
console.log("Hello " + vistorName);
}
def hello_vistor(visitor_name):
print('Hello ' + vistor_name)
func hello_visitor(visitor_name) {
fmt.Println("Hello " + visitor_name)
}
function hello_visitor($visitorName){
echo 'Hello ' . $visitorName;
}
.LC0:
.ascii "Hello \000"
_Z13hello_visitorPc:
.LFB1:
stmfd sp!, {fp, lr}
add fp, sp, #4
sub sp, sp, #8
str r0, [fp, #-8]
ldr r3, [fp, #-8]
ldrb r3, [r3] @ zero_extendqisi2
mov r2, r3
ldr r3, .L3
add r3, r2, r3
mov r0, r3
bl printf
mov r3, #0
mov r0, r3
sub sp, fp, #4
ldmfd sp!, {fp, lr}
bx lr
.L4:
.L3:
.word .LC0
Something that made me proud of me
- Metaforic – inside secure reverse engineering (mid 2019)
- In-House bypass solution for safetynet attestation (mid 2019)
- Open source 2 other great modules (hooah-trace | frida-onload) (mid 2019)
- Keynote at NowSecure Connect 2k19. Introduced Dwarf and some of my recent userspace takeovers over customized | commercial protections (mid 2019)
- Open source my debugger (Dwarf) (late 2018)
- Reverse engineering of an hand written, obfuscated with different techniques, crypto function (late 2018)
- A couple of beer and coffee around Venice with Supercell security engineer (late 2018)
- Keynote at HackInBo about reverse engineering on Android (mid 2018)
- Hitting 1.000.000 downloads on StatsRoyale Android app (mid 2018)
- Releasing our new Android app – StatsOfValor – for Arena of Valor (mid 2018)
- Reverse engineering the whole TCP protocol and encryption of Arena of Valor from tencent (mid 2018)
- Keynote at Disobey about reverse engineering on Android (early 2018)
- Keynote at Supercell HQ and coffee with development team (early 2018)
- Take me and the family to a new house (late 2017)
- Hitting 500.000 downloads on StatsRoyale Android app (late 2017)
- Being contacted from Supercell security engineer for knowledge sharing (late 2017)
- Exploiting and reverse engineering BoomBeach obfuscations (late 2017)
- Start working at Overwolf together with StatsRoyale guys (late 2017)
- Cracking and reverse engineering of Clash of Clans protocol (mid 2017)
- Being part of Bandyer team (mid 2017)
- My daughter (early 2017)
- PokèMesh – 80/100.000 active users as avarage, 4 milion requests at minute. (mid 2016)
- Move alone to the Netherlands (early 2015)
- Get stopped 3 times at high school because of World of Warcraft
something that i really, really, really love
- My daughter
- My whole family and friends
- Automation
- Coding, exploring
- Reverse engineering, get down the business
- Travelling
- Team works