skomak

@0x36_6

Pentester and Security Researcher - currently ICS & SCADA

Vrijeme pridruživanja: veljača 2008.

Tweetovi

Blokirali ste korisnika/cu @0x36_6

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x36_6

  1. 4. velj

    I posted an article about network data manipulation on the fly. In the work of security consultant you will need it, especially when dealing with binary protocols.

    Poništi
  2. proslijedio/la je Tweet
    18. pro 2019.

    Chrome 77 September release notes have just been updated with CVE-2019-13766 that I reported

    Poništi
  3. proslijedio/la je Tweet
    6. pro 2019.

    A while back I did a quick fuzzing exercise on Google Chrome <portal> element

    Poništi
  4. proslijedio/la je Tweet
    29. lis 2019.
    Poništi
  5. proslijedio/la je Tweet

    Very proud that our team has achieved a big breakthrough in quantum computing known as quantum supremacy after over a decade of work, as published in . Thank you to our collaborators in the research community who helped make this possible.

    Poništi
  6. proslijedio/la je Tweet
    6. lis 2019.
    Prikaži ovu nit
    Poništi
  7. 18. lip 2019.
    Poništi
  8. proslijedio/la je Tweet
    4. lip 2019.

    Arbitrary code execution vulnerability in Vim < 8.1.1365 and Neovim < 0.3.6 via modelines. 😬 Also, why you should not use Vim with default config, or cat without -v.

    Poništi
  9. proslijedio/la je Tweet

    Am I the first person to pop a shell in notepad? 🤣 ....believe it or not, It's a real bug! 🐞

    Poništi
  10. proslijedio/la je Tweet
    22. ožu 2019.

    A completely special today :-) Kilos of swiss chocolate for my kids and some premium burger s and chilli cheese sausages from a butcher's online shop for me

    Poništi
  11. proslijedio/la je Tweet
    21. svi 2019.

    Mission accomplished! All chapters of "Generating Software Test" (aka "The Fuzzing Book") are now out and complete - from lexical fuzzing over grammar-based and concolic testing to deep GUI fuzzing. You can run the Python code right within your browser!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    15. svi 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    If you want to play with the statistics for fuzzing, here is a tutorial as Jupyter notebook:

    Poništi
  13. 12. svi 2019.

    I wish all companies' websites would have implemented security.txt file () to make life easier for bug hunters and security researchers and themself.

    Poništi
  14. proslijedio/la je Tweet
    8. tra 2019.

    Call for One Page Articles for the 1st issue of Paged Out! zin! (it's a new free experimental deeply technical zin we're starting; it's about programming/security/hacking/demoscene/retro/electronics/etc) Details: Story: Please RT :)

    Poništi
  15. 21. velj 2019.

    Dragon Sector low level CTFs repo

    Poništi
  16. 6. velj 2019.

    - rekrutacja do polskiej cyber armii

    Poništi
  17. 5. velj 2019.
    Poništi
  18. proslijedio/la je Tweet
    3. velj 2019.
    Prikaži ovu nit
    Poništi
  19. 16. sij 2019.
    Poništi
  20. proslijedio/la je Tweet
    15. sij 2019.

    I guess I haven't promoted this idea enough, so if you are interested in properly trolling different scanners here's :

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·