Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @0x0aTang
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x0aTang
-
Prikvačeni tweet
Slides for my
#BHEU2017#CLKscrew talk on breaking TEEs with energy management mechanisms are posted. https://www.blackhat.com/docs/eu-17/materials/eu-17-Tang-Clkscrew-Exposing-The-Perils-Of-Security-Oblivious-Energy-Management.pdf … with PoC codebasehttps://github.com/0x0atang/clkscrew …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
TeamViewer stored user passwords encrypted, not hashed, and the key is now publichttps://whynotsecurity.com/blog/teamviewer/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
[Excellent Read] Was reviewing some of the data in this blog. Solid Write up. https://posts.specterops.io/mimidrv-in-depth-4d273d19e148 … by
@matterpreterHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
I found this article to be excellent. From building Windbg Tooling to working exploits. Its a dense and rich read. Really well done. I thought. Introduction to SpiderMonkey exploitation. https://doar-e.github.io/blog/2018/11/19/introduction-to-spidermonkey-exploitation/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
PHP 7.0-7.4 disable_functions bypass 0day PoChttps://github.com/mm0r1/exploits/tree/master/php7-backtrace-bypass …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
Just put together our recent struggle to solve the type equality problem in LLVM. I would love to hear some feedback from LLVM folks:https://lowlevelbits.org/type-equality-in-llvm/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
Multiple Ways to Persistence on Windows 10 with Metasploithttps://www.hackingarticles.in/multiple-ways-to-persistence-on-windows-10-with-metasploit/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
My new blog: Mozilla Firefox (versions 29 through 63) Select Element Use-after-free Vulnerability Details+Line by line PoC Analysis:https://twitter.com/thezdi/status/1145717021738508288 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
In the 1st of our Top 5 bugs for 2019,
@hosselot takes a look at a sandbox escape in#Firefox originally submitted to the program by@_niklasb. Read the details at http://bit.ly/2M0XatD#ZDITop5Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
"Analyzing Modern Malware Techniques - Part 1" by
@danusminimushttps://0x00sec.org/t/analyzing-modern-malware-techniques-part-1/18663 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
"AFLNet: A Greybox Fuzzer for Network Protocols", my joint work with
@mboehme_ & Abhik, is accepted as a testing tool paper@icstconference. It was motivated by many requests from AFL users for#stateful#greybox#fuzzing. Stay tuned for preprint & tool (with funder's approval).pic.twitter.com/oZqAmewD2G
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641 https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
Reverse Engineering new-gen Web Assembly applications using Chrome dev toolshttps://anee.me/reversing-web-assembly-wasm-dd59eb2a52d4 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
GitHub - cseagle/blc: Integrate Ghidra's decompiler as an Ida pluginhttps://github.com/cseagle/blc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
Practical reverse engineering is an awesome book with insightful windows kernel exercises - I decided to complete all of the exercises and post complete write-ups to my solutions

Here's the first one: Reversing AuxKlibQueryModuleInformation
https://repnz.github.io/posts/practical-reverse-engineering/query-module-information/ …pic.twitter.com/Q6pvPmiTlG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
I just published BUG BOUNTY CHECK LIST BY C1 Article includes a lot of what we usually need
#bugbounty#bugbountytipshttps://link.medium.com/bfv0nMdoB2Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
Wrote an exploit based on
@kyREcon's Symantec LPE writeup: https://github.com/v-p-b/cve-2019-12750/ … (still half-drunk, so no warranty...)pic.twitter.com/ic26ArYsH6
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
A recent result: deobfuscation via relational abstract interpretationpic.twitter.com/qPNUZsvBpm
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
a. tang proslijedio/la je Tweet
libFuzzer fuzzing SQLite in the browser using WebAssembly: https://jonathanmetzman.github.io/wasm-fuzzing-demo/sqlite/sqlite.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
a. tang proslijedio/la je Tweet
Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:https://github.com/jthuraisamy/SysWhispers …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.