Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @0xJ0ker
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xJ0ker
-
0x9k proslijedio/la je Tweet
CVE-2020-0674: Internet Explorer Remote Code Execution Vulnerability Exploited in the Wild Zero-day remote code execution vulnerability Triggers 0. JScript 1. used in
#argument 2.#recursion ... Proof of Concept Demo Videopic.twitter.com/K3PRkb753sOvo je potencijalno osjetljiv multimedijski sadržaj. Saznajte višeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
I wrote couple of blog posts discussing
#iOS security in depth along with a detailed walkthrough of the voucher_swap exploit Part 1: https://www.darkmatter.ae/papers-articles/from-zero-to-tfp0-part-1-prologue/ … Part 2: https://www.darkmatter.ae/papers-articles/from-zero-to-tfp0-part-2-a-walkthrough-of-the-voucher_swap-exploit/ … Part 3 will discuss Jailbreaking in detailPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
My first blog post on browser exploitation for
@infosectcbr. I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied. https://blog.infosectcbr.com.au/2020/01/firefox-spidermonkey-js-engine.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
#macOS#iOS XNU/IOKit info leak 1day. Killed in iOS 13.3.1 beta 2. - Call setNotifywith one of the async functions and pass it a mach port - Call incrementUseCount followed by decrementUseCount - Receive a message on your mach port https://github.com/Siguza/cuck00?fbclid=IwAR29DYvGbM09D0udAslZDYJEej_tQu9G4W1dlHrTQt41KunQeqwH3u2EHfY …pic.twitter.com/BtbMoLRhkfOvo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
RT - Many Releases! HTool Beta 1 for macOS & iOS: https://h3adsh0tzz.com/projects/htool/ Mach-O Helper Toolset for iOS (arm64): https://h3adsh0tzz.com/projects/macho-toolset/ … Libhelper for macOS, iOS & Linux: https://h3adsh0tzz.com/projects/libhelper/releases/ … And a quick blog post summarising it all: https://h3adsh0tzz.com/2020/01/htool-beta-1-release/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2. https://siguza.github.io/cuck00/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
1/ Insights from analyzing Chrome's patch for
#curveball#cve20200601 to protect Chrome's users on vulnerable unpatched#Win10 machines https://chromium-review.googlesource.com/c/chromium/src/+/1994434/6/net/cert/cert_verify_proc_win.cc …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
Assert yourself on the browser playground with
@mmolgtm ’s guide to hunting Chrome IPC sandbox escapes:https://securitylab.github.com/research/chromium-ipc-vulnerabilities …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
Browser jit exploitation quick start:
@5aelo Phrack paper is the base: http://phrack.org/papers/attacking_javascript_engines.html …@LiveOverflow well-described video series: https://liveoverflow.com/tag/browser-exploitation/ …@bkth_ presentation in SSTIC 2019: https://www.sstic.org/media/SSTIC2019/SSTIC-actes/Pwning_Browsers/SSTIC2019-Slides-Pwning_Browsers-keith.pdf … Also: https://doar-e.github.io/ https://phoenhex.re/ https://twitter.com/Sivenruot/status/1216293644757372928 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
[walk through] iOS Application Injection
#jailbroken iOS 12.4.3 Frida (https://frida.re ) Passionfruit (https://github.com/chaitin/passionfruit …) class-dump-swift (https://github.com/ivRodriguezCA/class-dump-binaries/raw/master/binaries/class-dump-swift …) Theos (https://github.com/theos/theos/wiki …) https://arjunbrar.com/post/ios-application-injection …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
Project Zero blog: "Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR Bypass" by Samuel Groß (
@5aelo) -- https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-2.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
Fuzzing JavaScript WebAssembly APIs with Dharma/Domato (Chrome/v8)https://webassembly-security.com/fuzzing-wasm-javascript-dharma-chrome-v8/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
Project Zero blog: "Remote iPhone Exploitation Part 3: From Memory Corruption to JavaScript and Back -- Gaining Code Execution" by Samuel Groß (
@5aelo) -- https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-3.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
Another "nice" kernel bug that literally allows to write any memory on the machine by any user (you just give kernel any exact physical or virtual address): https://syzkaller.appspot.com/bug?id=c173ad918406681bbb58281b0a9220b6504a4e29 … Again, killed before making it into any release: https://lkml.org/lkml/2020/1/8/216 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
Secure Boot in the Era of the T2 - by
@sirushttps://duo.com/labs/research/secure-boot-in-the-era-of-the-t2 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
An effort to build a single place for all useful android and iOS security related stuff.https://github.com/vaib25vicky/awesome-mobile-security …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
Messenger Hacking - Remotely Compromising an iPhone over iMessage https://saelo.github.io/presentations/36c3_messenger_hacking.pdf …
#MobileSecurity#iOSsecurity#Hacking#Infosecpic.twitter.com/TApdKeTu0X
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x9k proslijedio/la je Tweet
https://github.com/xerub/acorn untethered+unsandboxed code execution based on https://media.ccc.de/v/36c3-11034-tales_of_old_untethering_ios_11 … /cc
@littlelailo@s1guza@ZecOps@_bazadHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.