Medijski sadržaj

  1. 16. sij

    More stuff: Exploiting a Use-After-Free, based on a 36C3 CTF challenge:

  2. 1. sij

    New year, new merch - shipped with every radare2 pro license. Be like and get yours now!

  3. Check out this bearded guy and me presenting our exploit (CVE-2019-14745) at : We tried to fix the issue but found CVE-2019-16718 instead shortly before the talk ¯\_(ツ)_/¯

  4. Odgovor korisniku/ci
  5. Yo! New blog post: ROP on ARM with radare2 - with an exploitation challenge provided by / and a remote debugging setup:

  6. 6. stu 2019.
  7. New Blog Post: In-Process Fuzzing With (also featuring Frizzer by and ):

    Prikaži ovu nit
  8. New blog post: How I Over-Engineered My Dotfiles -

  9. 2. lis 2019.

    🎉 My car hacking tool CANalyzat0r has finally reached 500 stars on GitHub, one year after its initial release 🎉 Time to order new stickers 🚗🔥

  10. 1. lis 2019.
  11. 8. ruj 2019.

    Muchos thanks to everyone involved from for a vegan and maximum swag

  12. Odgovor korisniku/ci
  13. x64 ROP exploiting with : Executing syscalls using ret2csu -

  14. 8. kol 2019.

    New Blog post with some CTF-y content - Brute forcing stack canaries: with a bit of debugging magic

  15. Pwning for the PwnDebian challenge. Found a command injection hidden in a crafted binary. Fixed in master as of yesterday

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·