0x9k

@0xJ0ker

reverse&pwn&python&c&二次元萌妹子爱好者

Vrijeme pridruživanja: svibanj 2015.

Tweetovi

Blokirali ste korisnika/cu @0xJ0ker

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xJ0ker

  1. proslijedio/la je Tweet
    30. sij

    CVE-2020-0674: Internet Explorer Remote Code Execution Vulnerability Exploited in the Wild Zero-day remote code execution vulnerability Triggers 0. JScript 1. used in 2. ... Proof of Concept Demo Video

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  2. proslijedio/la je Tweet
    2. svi 2019.

    I wrote couple of blog posts discussing security in depth along with a detailed walkthrough of the voucher_swap exploit Part 1: Part 2: Part 3 will discuss Jailbreaking in detail

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  4. proslijedio/la je Tweet
    20. sij

    XNU/IOKit info leak 1day. Killed in iOS 13.3.1 beta 2. - Call setNotifywith one of the async functions and pass it a mach port - Call incrementUseCount followed by decrementUseCount - Receive a message on your mach port

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  5. proslijedio/la je Tweet
    17. sij

    RT - Many Releases! HTool Beta 1 for macOS & iOS: Mach-O Helper Toolset for iOS (arm64): Libhelper for macOS, iOS & Linux: And a quick blog post summarising it all:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    18. sij

    New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    17. sij

    1/ Insights from analyzing Chrome's patch for to protect Chrome's users on vulnerable unpatched machines

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    15. sij

    Assert yourself on the browser playground with ’s guide to hunting Chrome IPC sandbox escapes:

    Poništi
  9. proslijedio/la je Tweet
    13. sij
    Poništi
  10. proslijedio/la je Tweet
    13. sij
    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    9. sij

    Project Zero blog: "Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR Bypass" by Samuel Groß () --

    Poništi
  12. proslijedio/la je Tweet
    9. sij

    Fuzzing JavaScript WebAssembly APIs with Dharma/Domato (Chrome/v8)

    Poništi
  13. proslijedio/la je Tweet
    9. sij

    Project Zero blog: "Remote iPhone Exploitation Part 3: From Memory Corruption to JavaScript and Back -- Gaining Code Execution" by Samuel Groß () --

    Poništi
  14. proslijedio/la je Tweet
    9. sij

    Another "nice" kernel bug that literally allows to write any memory on the machine by any user (you just give kernel any exact physical or virtual address): Again, killed before making it into any release:

    Poništi
  15. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    6. sij
    Poništi
  17. proslijedio/la je Tweet
    4. sij

    An effort to build a single place for all useful android and iOS security related stuff.

    Poništi
  18. proslijedio/la je Tweet
    2. sij
    Poništi
  19. proslijedio/la je Tweet
    28. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·