starPt

@0net0all

OraOraOraOra

Vrijeme pridruživanja: studeni 2015.

Tweetovi

Blokirali ste korisnika/cu @0net0all

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0net0all

  1. proslijedio/la je Tweet
    prije 19 sati
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    I am starting a blog. First post is about the StarkWare Hash Challenge

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Pointer Compression in V8 and what it means for browser exploitation by

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Yearly reminder that by is awesome sauce 👌

    Poništi
  5. proslijedio/la je Tweet
    31. sij
    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  8. proslijedio/la je Tweet
    30. sij
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    29. sij
    Poništi
  10. proslijedio/la je Tweet
    30. sij

    A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption

    Poništi
  12. proslijedio/la je Tweet
    26. sij
    Poništi
  13. proslijedio/la je Tweet
    27. sij

    Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.

    Poništi
  14. proslijedio/la je Tweet
    26. sij

    Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳

    Poništi
  15. proslijedio/la je Tweet
    24. sij

    Hypervisor From Scratch – Part 7 : Using EPT & Page-Level Monitoring Features : 6: Virtualizing An Already Running System : 5: Setting up VMCS & Running Guest Code : cc

    Poništi
  16. proslijedio/la je Tweet
    23. sij
    Poništi
  17. proslijedio/la je Tweet
    23. sij

    Wow, crazy issue bypasses PAN: Part of the uaccess routines (__arch_clear_user() and __arch_copy_{in,from,to}_user()) fail to re-enable PAN if they encounter an unhandled fault while accessing userspace. Check out the patch:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    22. sij

    So has just finished streaming 7th installment of solving PicoCTF challenges and I've finished editing part 2 of solving Hitcon's CoreDumb with Ghidra so if you don't have yet enough 👉 📺

    Poništi
  19. proslijedio/la je Tweet
    22. sij

    if you find 403 Forbidden while testing. Try X-Original-URL and X-Rewrite-URL Headers to bypass restrictions

    Poništi
  20. proslijedio/la je Tweet
    21. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·