@runm@gesh

@marunmagesh

Puny Potato - Security researcher - Hardware maker - Trainer - Speaker - Intel Software Innovator - 25 Under 25 - Shit Posting. My views are solely on me.

up above the cloud
Vrijeme pridruživanja: travanj 2014.

Tweetovi

Blokirali ste korisnika/cu @marunmagesh

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @marunmagesh

  1. Prikvačeni tweet
    28. lis 2019.

    Created some kind of cheatsheet for hardware hacking/testing. Basically to connect and do stuff without googling. (Not a designer. bare with my crude design.)

    Poništi
  2. prije 12 sati
    Poništi
  3. proslijedio/la je Tweet
    prije 16 sati

    No goodbye without a small gift: Pushed P4wnP1 A.L.O.A. version 0.1.1-beta - Bumps to KALI 2020.1 - add additional keyboad layouts - fix existing layouts - other bugfixes (This prepares handover of the repo to a new maintainer) Be sure to update:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    prije 23 sata

    I'll be giving out a free seat for the Windows Kernel Exploitation Foundation & Advanced (3 days) training course Goa 2020 to a woman in security with a keen interest in vulnerability research and exploit development. Please DM me if interested.

    Poništi
  5. proslijedio/la je Tweet
    5. velj
    Poništi
  6. proslijedio/la je Tweet
    5. velj

    Infosec skills shortage? This is a salary lower than you'd have got in 2009 for a more junior role. I can only assume they are serious when they mandate a criminal background...

    Poništi
  7. proslijedio/la je Tweet
    5. velj

    1/ I can finally share the exploit demo video for CVE-2020-6007: TL;DR: We managed to infiltrate into a computer network using an over-the-air Zigbee exploit on the Philips Hue Bridge (smart lightbulbs controller).

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet

    A guy who lives on my street rang my doorbell and said, “Are you the lesbian who saves the cats?” And I said, “Yes. That’s exactly who I am. Let me get my coat.”

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    5. velj

    Getting serious with ChipSHOUTER 😆

    Poništi
  10. proslijedio/la je Tweet
    5. velj
    Poništi
  11. proslijedio/la je Tweet
    5. velj

    Serious Repair Work On The Amiga 600 The Amiga will be forever loved for bringing serious multimedia capabilities to the home computer market. However, these machines are now showing their age, and keeping them running can take a bit of work. [Drygol] i…

    Poništi
  12. proslijedio/la je Tweet
    4. velj

    I'm really rather excited to announced that from the start of next week I'll be joining the team at to work on their technical documentation. Don't jump into my email all at once, but if you've got pain points, you now know who to talk to on the team.

    The Raspberry Pi 4, Model B.
    Poništi
  13. proslijedio/la je Tweet
    4. velj

    The address bar is the most important indicator in modern browsers. Recently bandit - Nikhil Mittal () - discovered an address bar spoof vulnerability in for .

    Poništi
  14. proslijedio/la je Tweet
    4. velj

    ATTENTION EUROPE! I'll be at in April to teach my 2-day hardware hacking class with an optional day of digital forensics-related activities. No prior experience needed.

    Poništi
  15. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  16. proslijedio/la je Tweet
    4. velj

    Western women need to sit down and have a serious chat about why they fucking despise the female body. If tits make you this upset you're broken.

    Poništi
  17. proslijedio/la je Tweet
    4. velj

    The very amazing Eva Galperin 2020 Thursday Closing Keynote amazing points she shared and info about

    Poništi
  18. proslijedio/la je Tweet
    3. velj
    Poništi
  19. proslijedio/la je Tweet
    2. velj

    This should be a central plot point in a heist film.

    Poništi
  20. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  21. proslijedio/la je Tweet
    2. velj

    Please have another peek into the kitchen! This exercise uses fault injection which is commonly used to bypass Secure Boot when software vulnerabilities are unknown. Join us at to experience many more ways to bypass Secure Boot!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·