Ömer Coşkun

@0xM3R

Gentleman, Computer Scientist (RE, EXP, PRO) - I don't talk my employer behalf - chasing

Darknet
Vrijeme pridruživanja: siječanj 2012.

Tweetovi

Blokirali ste korisnika/cu @0xM3R

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xM3R

  1. proslijedio/la je Tweet
    prije 24 sata

    The full set of my 2019 graduate-level computer architecture course lectures at ETH Zurich is online, along with all lecture videos, slides, and course materials: Course schedule: Youtube playlist: First…

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  3. proslijedio/la je Tweet
    7. pro 2019.

    The scathing absence of Python 3 support in libptrace has been resolved as of now with the release of 1.0-rc2 Time to rest. I'm convinced that dealing with NSIS scripting past midnight would mortify even the hardiest of Flagellants.

    Poništi
  4. proslijedio/la je Tweet
    20. sij
    Poništi
  5. proslijedio/la je Tweet
    20. sij

    Open sourced a bit of automation around unpacking apps using devices;

    Poništi
  6. proslijedio/la je Tweet
    17. sij

    I just published a video explaining the details of CVE-2020-0601 aka Curveball: The Microsoft CryptoAPI vulnerability that was reported by the NSA.

    Poništi
  7. proslijedio/la je Tweet
    8. sij

    Linux Kernel Runtime Guard (LKRG) bypass collection by Ilya Matveychikov, CC

    Poništi
  8. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  9. proslijedio/la je Tweet
    3. sij

    APT34 partial tools leak (repost as this got taken down very quickly)

    Poništi
  10. proslijedio/la je Tweet
    30. pro 2019.

    Also while I am on twitter :P PS4 Webkit exploit for 6.XX consoles. Gains addrof/fakeobj and arbitrary read and write primitives. Fixed in 7.00. Uses bug from:

    Poništi
  11. proslijedio/la je Tweet
    29. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    27. pro 2019.

    Friday night tweetin' for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.

    Poništi
  13. proslijedio/la je Tweet
    27. pro 2019.

    The AMD Secure Processor is a CPU in your CPU you do not control. It’s a Trusted Execution Environment to protect VMs from host access or copyrighted work from distribution. At I will present our PSP hacking and how we regained control over it.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    27. pro 2019.

    My talk on iMessage exploitation () starts in two hours. You can watch it in room Ada or on

    Poništi
  16. proslijedio/la je Tweet
    25. pro 2019.

    We made a website which shows a genealogy of fuzzers: Basically, this is a fork from the one we have in the survey, but which we can keep up-to-date and where anyone can contribute at:

    Poništi
  17. proslijedio/la je Tweet
    25. pro 2019.

    I just ported exploit of Jann Horn's vuln CVE-2019-13272 to aarch64:

    Poništi
  18. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    12. pro 2019.

    All 's IDA scripts have (finally) been ported to Ghidra. Woohoo!

    Poništi
  20. 10. pro 2019.

    010 editor has just introduced debugging feature and it looks awesome -

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·