a. tang

@0x0aTang

systems tinkerer / cybersec researcher

New York
Vrijeme pridruživanja: srpanj 2014.

Tweetovi

Blokirali ste korisnika/cu @0x0aTang

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x0aTang

  1. Prikvačeni tweet
    9. pro 2017.
    Poništi
  2. proslijedio/la je Tweet
    prije 14 sati

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    [Excellent Read] Was reviewing some of the data in this blog. Solid Write up. by

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    I found this article to be excellent. From building Windbg Tooling to working exploits. Its a dense and rich read. Really well done. I thought. Introduction to SpiderMonkey exploitation.

    Poništi
  5. proslijedio/la je Tweet
    30. sij
    Poništi
  6. proslijedio/la je Tweet
    28. sij

    Just put together our recent struggle to solve the type equality problem in LLVM. I would love to hear some feedback from LLVM folks:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    26. sij
    Poništi
  8. proslijedio/la je Tweet
    1. srp 2019.

    My new blog: Mozilla Firefox (versions 29 through 63) Select Element Use-after-free Vulnerability Details+Line by line PoC Analysis:

    Poništi
  9. proslijedio/la je Tweet

    In the 1st of our Top 5 bugs for 2019, takes a look at a sandbox escape in originally submitted to the program by . Read the details at

    Poništi
  10. proslijedio/la je Tweet
    19. sij
    Poništi
  11. proslijedio/la je Tweet
    11. sij

    "AFLNet: A Greybox Fuzzer for Network Protocols", my joint work with & Abhik, is accepted as a testing tool paper . It was motivated by many requests from AFL users for . Stay tuned for preprint & tool (with funder's approval).

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    9. sij

    Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641

    Poništi
  13. proslijedio/la je Tweet
    30. pro 2019.

    Reverse Engineering new-gen Web Assembly applications using Chrome dev tools

    Poništi
  14. proslijedio/la je Tweet
    30. pro 2019.

    GitHub - cseagle/blc: Integrate Ghidra's decompiler as an Ida plugin

    Poništi
  15. proslijedio/la je Tweet
    27. pro 2019.

    Practical reverse engineering is an awesome book with insightful windows kernel exercises - I decided to complete all of the exercises and post complete write-ups to my solutions 😛🥳 Here's the first one: Reversing AuxKlibQueryModuleInformation

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    21. pro 2019.

    I just published BUG BOUNTY CHECK LIST BY C1 Article includes a lot of what we usually need

    Poništi
  17. proslijedio/la je Tweet
    20. pro 2019.

    Wrote an exploit based on 's Symantec LPE writeup: (still half-drunk, so no warranty...)

    Poništi
  18. proslijedio/la je Tweet
    18. pro 2019.

    A recent result: deobfuscation via relational abstract interpretation

    Poništi
  19. proslijedio/la je Tweet
    14. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    13. pro 2019.

    libFuzzer fuzzing SQLite in the browser using WebAssembly:

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    10. pro 2019.

    Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·