Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @GXiling
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @GXiling
-
GongXiling proslijedio/la je Tweet
Hyper-V memory internals. Guest OS memory access (English version) https://hvinternals.blogspot.com/2019/09/hyper-v-memory-internals-guest-os-memory-access.html …pic.twitter.com/ylE5jYB7kC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GongXiling proslijedio/la je Tweet
Breaking Google Home: Exploit It with SQLite (Magellan)
#MobileSecurity#IoTSecurity#defcon27 [SLIDES] by@leonwxqian@Xbalien29@NickyWu_ https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Wenxiang-Qian-Yuxiang-Li-Huiyu-Wu-Breaking-Google-Home-Exploit-It-with-SQLite-Magellan.pdf …pic.twitter.com/bzsV0kgKZK
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GongXiling proslijedio/la je Tweet
A very deep dive into iOS Exploit chains found in the wild https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GongXiling proslijedio/la je Tweet
TEE-reversing - a curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices
#MobileSecurity#AndroidSecurity by@enovella_https://github.com/enovella/TEE-reversing …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GongXiling proslijedio/la je Tweet
We've finally managed to update our Secure Boot Technical Overview to cover the enhancements from the last couple of years (h/t
@NAKsecurity for the excellent initial document). Find this and a whitepaper on secure storage in TrustZone at http://qualcomm.com/company/product-security/resources ….Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GongXiling proslijedio/la je Tweet
Began curating a list of Hyper-V exploitation resources, hope it can be of use to anyone interested in starting Hyper-V security research: https://github.com/shogunlab/awesome-hyper-v-exploitation …
#ExploitDev#HyperVpic.twitter.com/fS6jAmajin
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Update the Slides: The vulnerability that allows arbitrary read/write Linux Kernel memory from Modem is CVE-2019-10538, which already fixed in the August Android Security Bulletinhttps://twitter.com/mobilesecurity_/status/1161012639948058624 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GongXiling proslijedio/la je Tweet
The slides for my talk
@reconmtl about Hexagon and aDSP are (finally) available at https://cfp.recon.cx/media/Attacking-Hexagon-Recon-Montreal-2019.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.