Tweetovi

Blokirali ste korisnika/cu @0xmemeda

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xmemeda

  1. proslijedio/la je Tweet
    15. sij

    Our researchers ( and ) successfully reproduced CVE-2020-0601, which is the crypto bug in Microsoft Windows reported by NSA!!

    Poništi
  2. proslijedio/la je Tweet
    29. pro 2019.

    We got 2nd place in ctf! Thanks to for the great problems.

    Poništi
  3. 13. pro 2019.
    Poništi
  4. proslijedio/la je Tweet
    11. pro 2019.

    1. We are one of the top computer security labs in the world! 2. We are home of .. 3. We do really interesting and practical Systems & Security research. 4. Also, this: :))

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    6. srp 2019.

    I wrote a quick summary for a research paper that I came across - "Fuzzing File Systems via 2D Input Space Exploration" in my blog. Great Content and I loved going through it.

    Poništi
  6. 23. srp 2019.

    Insu OTZ...Yet another Safari full chain exploit made by SSLab 😃

    Poništi
  7. 18. srp 2019.

    Thanks for your interests haha. Let’s see if we have a chance to make this together:)

    Poništi
  8. proslijedio/la je Tweet
    15. srp 2019.

    Please check our new blog "Exploiting TurboFan Through Bounds Check Elimination". … BTW, if you are interested in real-world style challenges, please keep the focus on of this year. 😉

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    15. srp 2019.

    Here is the details for CVE-2019-0609 🥳

    Poništi
  10. 24. svi 2019.

    Here is the slides of the talk on ZeroCon 2019 (DOM fuzzing part) by me and Soyeon Park (). I will open source my WebGL fuzzer when having time.

    Poništi
  11. proslijedio/la je Tweet
    8. ožu 2019.
    Poništi
  12. 1. ožu 2019.

    macOS Safari exploit demo, developed with All the bugs have been reported.

    Poništi
  13. proslijedio/la je Tweet

    [New speaker update] Wen Xu, Soyeon Park Topic: Comprehensive Browser Fuzzing: From DOM to JS Presenting several DOM and JS bugs we found in Edge, Safari and Chrome, and demonstrate how to exploit one Safari RCE bug on macOS regardless of the isolated heap introduced in 2018.

    Poništi
  14. 9. sij 2019.

    Check our group's work: "Fuzzing File Systems via Two-Dimensional Input Space Exploration": We will open source soon. Thanks to for inspiring this work.

    Poništi
  15. proslijedio/la je Tweet
    15. ruj 2018.

    Our event has now ended!! Congratulations to the Top 10 qualifiers who will be invited to join us on Dec. 15 -16 in Tokyo to compete in the FINAL!! We also wanted to thank ALL the teams that competed and hope you will join us next year!

    Poništi
  16. proslijedio/la je Tweet
    8. tra 2018.

    zerofsのsymlink解たぶん理解した。

    Poništi
  17. proslijedio/la je Tweet
    6. tra 2018.
    Poništi
  18. proslijedio/la je Tweet
    1. tra 2018.

    Some thoughts on this year's 0ctf: 1. pwn are fun,but using side channel attack to leak the flag is kinda annoying. House of Card is amazing. 2. g0g0g0 is kinda frustrating. Figured out the algorithm but failed to solve the equation 😔 3. I (still) suck at web! 😭

    Poništi
  19. proslijedio/la je Tweet
    1. tra 2018.

    was nice, great pwns as usual ;] thanks , some of my :

    Poništi
  20. 1. tra 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·