Mesh3L

@0x_saudi

اللَّهُمَّ اجْعَلْ لَنا مِنْ كُلِّ ضِيقٍ مَخْرَجاً، مِنْ كُلِّ هَمٍّ فَرَجاً، وَمِنْ كُلِّ بَلاَءٍ عَافِيَةً

Vrijeme pridruživanja: travanj 2011.

Tweetovi

Blokirali ste korisnika/cu @0x_saudi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x_saudi

  1. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    هذا كتاب اسمه The Old New Thing يوثق التفاصيل الصغيرة عن Windows الي ممكن يهتم فيها المبرمج، ما أقدر أصنفه بس ممكن تقرأ جدول المحتويات عشان تفهمه: فيه مدونة رهيبة للكاتب بنفس الاسم.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    30. sij

    I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumar

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions

    Poništi
  6. proslijedio/la je Tweet
    1. velj

    Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.🧑‍💻

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    25. sij

    Some notes on PoshC2, operational considerations + a couple of tweaks to default beacons which might reduce exposure to Blue team

    Poništi
  8. proslijedio/la je Tweet
    2. velj
    Poništi
  9. proslijedio/la je Tweet
    2. velj

    Pointer Compression in V8 and what it means for browser exploitation by

    Poništi
  10. proslijedio/la je Tweet
    2. velj

    I am starting a blog. First post is about the StarkWare Hash Challenge

    Poništi
  11. proslijedio/la je Tweet
    31. sij
    Poništi
  12. proslijedio/la je Tweet
    1. velj

    ان كنت مسجلًا في مبادرة سايبرهب ادخل الآن للمنافسة ضمن مسابقة التقط العلم برعاية من TrendMicro حيث يتنافس طلاب الجامعات السعودية في حل تحديات بمختلف مجالات الأمن السيبراني لمدة 24 ساعة شارك الان من خلال الرابط التالي:

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Someone dropped a PHP zero-day on GitHub. Talked to the PHP team last night. Bug requires local foothold to exploit, so not usable for remote attacks. Also, this is the second exploit for this "disable_functions bypass" in the last few months.

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    New writeup by me and of a new Iranian campaign we discovered! Special thanks to for assisting as well!

    Poništi
  15. proslijedio/la je Tweet
    30. sij

    I started an issue to work on creating Bert for Arabic - AraBert. If you are interested please respond there.

    Poništi
  16. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  17. proslijedio/la je Tweet
    30. sij
    Poništi
  18. proslijedio/la je Tweet
    30. sij
    Poništi
  19. proslijedio/la je Tweet
    28. sij

    Just published my latest blog titled (Ab)using Kerberos from Linux, which covers common Kerberos abuse vectors, as well as how to exploit them from Linux using Impacket. Check it out here:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    30. sij

    HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·