paper fox

@0penw0rld

learning stuff. this profile is mostly for bookmarks

Vrijeme pridruživanja: travanj 2014.
Rođen/a 1995.

Tweetovi

Blokirali ste korisnika/cu @0penw0rld

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0penw0rld

  1. prije 20 sati
    Poništi
  2. proslijedio/la je Tweet
    23. sij

    CVE-2020-0609 & CVE-2020-0610 Before / After patch Pseudo-code

    Poništi
  3. proslijedio/la je Tweet

    Threatpost Poll: Are Published PoC Exploits a Good or Bad Idea? via

    Poništi
  4. proslijedio/la je Tweet

    As someone who's spent many years hardening & protecting systems, I'm here to tell you it's a crapshoot. It's all about risk management. Read why in "Cybersecurity Is Entirely Relative" - via

    Poništi
  5. proslijedio/la je Tweet
    15. sij

    SERIOUSLY UNDERSTAND IRAN DOES HAVE MAJOR STATE SPONSORED CYBER ATTACK ABILITIES AND THEY AINT EASY TO TRACK BELIEVE ME HAVING RECEIVED SUPPORT IN THEIR CYBER ATTACK ABILITIES FROM RUSSIA, NK AND CHINA Iranian Threat Actors: Preliminary Analysis

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    15. sij

    Hunting for beacons – Fox-IT International blog

    Poništi
  7. 18. sij
    Poništi
  8. proslijedio/la je Tweet
    14. sij

    Hey, new upload to Windows-Insight - the Windows Telemetry ETW Monitor framework: The framework monitors and reports on ETW (Event Tracing for Windows) activities for providing data to Windows Telemetry. Works on Windows 10, version 1909. [Thread: 1/4]

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    12. sij

    What the internet looks like with CVE-2019-19781, meanwhile is that guy silently eating his kabab and watching...

    Poništi
  10. proslijedio/la je Tweet

    Cloud Security is a partnership. Read that SLA carefully, it's not an "Security's on them" arrangement. Find out what's involved by reading "Engineering Security into Cloud Systems"- via

    Poništi
  11. proslijedio/la je Tweet
    6. sij

    ToTok claims in its email to me that a former NSA worker (they didn’t identify who) gave its app a 👍. But the NYT had examine the app - Patrick is also former NSA - and he found it to be a spy tool.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    “Oh, god, please no.” - Every InfoSec professionalism when they get this fortune cookie.

    Poništi
  13. proslijedio/la je Tweet
    6. sij

    Google allowed ToTok back into its Google Play store over the weekend, despite the fact that the intel community insists the chat app is a spy tool for the UAE and ToTok is trying to bribe journalists into saying good things about it 👇

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    18. sij 2018.

    An entire book on PCB reverse engineering! Includes work by , , and Sergei Skorobogatov among others :)

    Poništi
  15. proslijedio/la je Tweet
    8. stu 2016.

    "Reverse engineering Flash EEPROM memories using Scanning Electron Microscopy" by Franck Courbon, Sergei Skorobogatov and Christopher Woods

    Poništi
  16. proslijedio/la je Tweet
    1. sij

    When I read my code from many years ago, I not only remember the code, but often also get a full-blown flashback from the moment of writing it: random memories of the whole surroundings, with sounds, smells, emotions, etc. Anyone else can relate?

    Poništi
  17. proslijedio/la je Tweet

    ┏━━┓┏━━┓┏━━┓┏━━┓ ┗━┓┃┃┏┓┃┗━┓┃┃┏┓┃ ┏━┛┃┃┃┃┃┏━┛┃┃┃┃┃ DO NOT SELL MY PERSONAL INFORMATION ┃┏━┛┃┃┃┃┃┏━┛┃┃┃┃ ┃┗━┓┃┗┛┃┃┗━┓┃┗┛┃ ┗━━┛┗━━┛┗━━┛┗━━┛

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    15. pro 2019.

    Multiple RCE Vulnerabilities Found In Siemens Power Generation Plants: Like every other thing connected to the internet, power plants are also vulnerable to cyber attacks.  Recently, researchers caught numerous Multiple RCE Vulnerabilities Found In…

    Poništi
  19. 2. sij

    I am pretty sure created base for story for after watching this

    Poništi
  20. proslijedio/la je Tweet
    30. pro 2019.

    2019 Framework wrap-up: Two new payload types, six pieces of research, a password-cracking overhaul, mania. Plus, our list of MVP module contributions, from VPN and deserialization exploits to some neat persistence content. Cheers!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·