Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Der0ad
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Der0ad
-
Prikvačeni tweet
Reminder for myself: do one project at a time.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Giovanni proslijedio/la je Tweet
PHP 7.0-7.4 disable_functions bypass 0day PoChttps://github.com/mm0r1/exploits/tree/master/php7-backtrace-bypass …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Giovanni proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Giovanni proslijedio/la je Tweet
Announcing BLAKE3!
* Faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2
* Merkle tree: unlimited parallelism, verified streaming
* Builtin MAC, KDF, XOF
* One algorithm, no variants
* Rust crate: https://crates.io/crates/blake3
Try it: cargo install b3sum
http://blake3.io pic.twitter.com/QJWIwi44go
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Today i finally release a disassembler for the Machine Code 7 (MC7) bytecode used in Siemens Step 7 PLCs (S7-300 and S7-400). The library can be used with radare2 (via `r2pm install libmc7`)https://github.com/wargio/libmc7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Happy new year!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Giovanni proslijedio/la je Tweet
If you don't want to celebrate new year eve.. you can always celebrate that today Python dies a bit
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Giovanni proslijedio/la je Tweet
That moment when both
#ccc and#36c3 are the very first News Report on Germans biggest TV Newscast today
pic.twitter.com/XkgGJn1LHc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Giovanni proslijedio/la je Tweet
We got our emulation assembly at
#36c3! Feel free to visit and grab a drink with us. Glad to have such awesome neighbors too: KJC, Nintenbros and fail0verflow.https://www.reddit.com/r/EmuDev/comments/efu49j/come_visit_the_emulation_assembly_during_36c3/?utm_medium=android_app&utm_source=share …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Giovanni proslijedio/la je Tweet
If you want to learn about post-quantum and/or isogeny based cryptography then I have just the right
#36c3 talk for you: https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10543.html … Also, join us at the#Nintenbros assembly if you are into hacking game consoles. We will make sure to bring some stuff with us!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
And yes, written in native java and no deps are required. you can build it by yourself via netbeans or download the pre-built jar in the release page.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
So in the past days i had to use burp for a pentest and i needed to decode raw protobuf. Now there is a plugin for it but it REQUIRES Jython (150 MB) only to decode a damn protobuf. so i wrote one: https://github.com/wargio/BurpProtocolBuffers … it's 37 KB. Enjoy
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Easy, which curve is safe in ECC (NIST and non-NIST ones)https://twitter.com/FiloSottile/status/1198487261421154304 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Giovanni proslijedio/la je Tweet
Part 1 of my articles explaining how
@ptsecurity 's exploit of the Intel ME works and how to JTAG a skylake's ME and control its USB devices via the ME : https://kakaroto.homelinux.net/2019/11/exploiting-intels-management-engine-part-1-understanding-pts-txe-poc/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Giovanni proslijedio/la je Tweet
Hot on the heels of the first part of my "Exploiting Intel's Management Engine" series of articles, here is part 2, porting to ME 11.x : https://kakaroto.homelinux.net/2019/11/exploiting-intels-management-engine-part-2-enabling-red-jtag-unlock-on-intel-me-11-x-intel-sa-00086/ … Includes release of the ME 11.x exploit and an MFS manipulation tool.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Giovanni proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Today I've release for
@radareorg raw protobuf decoding. It's quite easy to use, just type pFb @ 0x1234 and it will print the decoded protobuf.pic.twitter.com/uPZ9KuCJDo
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Giovanni proslijedio/la je Tweet
Another one of my 'let me teach you something' blog posts.. after the ECDSA post, and the intro to reverse engineering and assembly, here's one on how computers work : https://kakaroto.homelinux.net/2019/10/how-a-computer-works-part-1/ … Hopefully, it's an interesting read and was worth dusting it off!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.