Sophia d’Antoine

@Calaquendi44

Hacker in Residence @ NYU, , Deepstate

New York, NY
Vrijeme pridruživanja: kolovoz 2016.

Tweetovi

Blokirali ste korisnika/cu @Calaquendi44

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Calaquendi44

  1. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    30. sij

    has 151 trainings. We have 18. 18 of the best hacker trainings you can ever find. Early 🐦 prices are still available at ! Register now ➡️ RTs appreciated!

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Me: Mom can we buy slack Mom: We have slack at home Slack at home:

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    A former head of the Australian Signals Directorate’s SIGINT & offensive cyber mission excoriates the UK Huawei decision. "they have doubled down on a flawed and outdated cybersecurity model to convince themselves that they can manage the risk" 

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    22. sij

    How many Pwn2Own Master of Pwn points did MBS get for hacking Bezos? -

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    oh you like windows internals? name every syscall

    Poništi
  7. proslijedio/la je Tweet
    21. sij

    It's our privilege to announce Sophia d'Antoine () as a Keynote Speaker! Sophia is Hacker in Residence at NYU and founder of Margin Research. She has spoken at conferences worldwide and we're excited to see her at Kernelcon! Find out more @

    Poništi
  8. 14. sij

    INFILTRATE Training Update! Happy to announce from will be joining as a co-trainer. Come learn how to use program analysis for vulnerability research.

    Poništi
  9. proslijedio/la je Tweet
    11. sij
    Poništi
  10. proslijedio/la je Tweet
    23. pro 2019.

    Learn inside and out with as she teaches "Program Analysis for Vulnerability Research" at . Become a ninja at and vulnerability discovery in 4 days ⭐ Get up to 25% OFF before Dec 31:

    Poništi
  11. proslijedio/la je Tweet
    15. pro 2019.

    the FORBIDDEN ctf tactics the pros DONT want you to know!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    6. pro 2019.

    “I want to find more bugs faster.” If that’s you, then you should attend Margin Research’s Program Analysis for Vulnerability Research at this year. 

    Poništi
  13. 5. pro 2019.

    Exciting to be giving training at ringzerØ next year! “Program Analysis for Vulnerability Research”

    Poništi
  14. proslijedio/la je Tweet
    22. lis 2019.

    It takes 60 seconds to talk to your kids about and make them

    Poništi
  15. proslijedio/la je Tweet
    26. stu 2019.

    Excited to be able to share some of the work our team has been doing on binary hashing - specifically how we can solve some real-world challenges we see in commercial binary audits and from 's program. Read up at for background. More soon!

    Poništi
  16. proslijedio/la je Tweet
    19. stu 2019.

    'If you control the patch to that piece of equipment, you OWN that equipment' - Mike Rogers on Huawei tech as a major security threat

    Poništi
  17. 17. stu 2019.
    Poništi
  18. 14. stu 2019.

    Forget cryptocurrency, send money via bot armies and Ad fraud, 1 mill clicks for an iphone ... fair trade

    Poništi
  19. proslijedio/la je Tweet

    IRA ran a memetic, social-first operation. The GRU ops are much more of a modern-era update of traditional narrative laundering operations and media manipulation. Full report here:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    14. stu 2019.

    This is what responsible disclosure looks like when you take its makeup off

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·