Azeria

@Fox0x01

Researcher, Exploit Dev, Tutorialista | RB | Arm Exploitation Trainer | Current focus: Android & TrustZone 🦊🦊

Europe
Vrijeme pridruživanja: kolovoz 2015.

Tweetovi

Blokirali ste korisnika/cu @Fox0x01

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Fox0x01

  1. Prikvačeni tweet
    6. sij

    This year I’m teaming up with some amazing folks to create a new startup that will help people advance their skills and bring new people into the field. Former attendees and those who take my upcoming training will get free access to the platform before anyone else does.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Low Ticket Alert! Azaria Labs (): Advanced IoT Exploit Development for Arm 32-bit training class has only 4 seats left. 

    Poništi
  3. proslijedio/la je Tweet
    29. sij

    CanSecWest is offering a free training and conference admission to the top 4 talk submissions from someone 25 or younger! All qualifying submissions also get a 10% discount on conference ticket. That’s basically a $5000 USD grant to the top 4 submissions. Please share!

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    Foxes with threatening auras: 🎧On🎧

    Poništi
  5. proslijedio/la je Tweet

    Keep on hearing about backdoors in Huawei Keep on seeing really shoddy code and vulnerabilities that allows remote access in western networking and access kit. Making stuff super secure is hard but peddling FUD in the name of national security is seemingly easier it seems

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    20. sij

    The ADHD trait of "a million projects" is actually an adaptive strategy for brains that very specifically can't do what they set out to. By working "sideways" on many things, you get a *lot* done—while feeling like you "never do anything" (i.e., what you're "supposed" to do). 1/

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    12. velj 2018.

    Want learn how APTs operate? There's a hidden section on my website, a rather extensive APT Stages 101. [1/n] Stages covered: 1. Reconnaissance 2. Initial compromise 3. Persistence 4. C&C 5. Privilege escalation 6. Lateral movement 7. Asset discovery 8. Data exfiltration

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    20. sij
    Poništi
  9. proslijedio/la je Tweet
    18. sij

    Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)

    Prikaži ovu nit
    Poništi
  10. 18. sij

    SAS is my absolute favorite conference and I’m super excited to return this year 🤩

    Prikaži ovu nit
    Poništi
  11. 18. sij

    Happy news! and I got accepted to 🥳 We are going to present "Hide & Seek: The lifecycle of in-memory implants on Android devices" \o/

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    My analysis of Remote Desktop Gateway RCE bugs CVE-2020-0609 & CVE-2020-0610 is up.

    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. proslijedio/la je Tweet
    16. sij

    “Google it” means I don’t owe you labor. “Google it” means I choose not to give you my labor. “Google it” means I believe you’ll learn from the process of discovery than from me handing you answers. “Google it” means learn to use the vast resources at your disposal. Google it.

    Tweet je nedostupan.
    Poništi
  15. proslijedio/la je Tweet
    16. sij
    Odgovor korisnicima

    More unpatched kernel bugs.

    Poništi
  16. proslijedio/la je Tweet
    15. sij
    Poništi
  17. proslijedio/la je Tweet

    New - As Apple heads towards mediation with Corellium over its lawsuit, the startup and are claiming the iPhone maker's claims threaten to dangerously expand the reach of U.S. copyright law.

    Poništi
  18. 10. sij

    Jet lag be like: going to sleep at 8am and waking up at 4pm. Working through the night is weirdly satisfying but I haven’t seen the sunlight in 3 days ._. R.I.P. my sleeping schedule.

    Poništi
  19. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  20. 6. sij

    We have a lot of problems in our industry that need a solid solution. Filling the talent gap with approachable high end education has been my goal for quite some time now. Now is the perfect time to make it happen.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·