HackSys Team

@HackSysTeam

Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

India
Vrijeme pridruživanja: rujan 2012.

Tweetovi

Blokirali ste korisnika/cu @HackSysTeam

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HackSysTeam

  1. Prikvačeni tweet
    7. sij

    I'll be teaching Windows Kernel Exploitation Foundation and Advanced (2 days) each Vancouver. Register if kernel exploitation excites you. cc:

    Poništi
  2. prije 2 sata
    Poništi
  3. prije 2 sata
    Poništi
  4. proslijedio/la je Tweet
    prije 23 sata

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  5. proslijedio/la je Tweet
    prije 17 sati

    I’ve just uploaded my Jailbreak for the iPad Pro (2017) to GitHub. Right now, SSH and Sileo can be installed. Due to lack of devices, I cannot currently implement support for other devices. Feel free to create PRs if you would like to help me!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    prije 21 sat

    The ultimate test of your knowledge is your capacity to convey it to another.

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    Pointer Compression in V8 and what it means for browser exploitation by

    Poništi
  8. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  9. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  11. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    Feynman Lessons for Learning: 🧠 1) Understanding is more important than memorization! 2) Learn principles, not formulas. 3) Ask questions! 4) Read Books every day. 5) Teaching is a powerful tool to learning.

    Poništi
  13. proslijedio/la je Tweet
    29. sij

    HEVD Exploits – Windows 7 x86 Arbitrary Write

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    this is a xnu kernel info leak bug poc ,the bug which I found one year ago. I tested on 10.14.5 and iOS 13.2 it seems patched recently I don't know the CVE id.

    Poništi
  15. proslijedio/la je Tweet
    30. sij

    A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).

    Poništi
  16. proslijedio/la je Tweet
    28. sij

    OS hacking: Local root exploit via the QEMU graphics driver Let’s exploit a SerenityOS kernel driver bug to get a root shell, and then fix the bug! 🐞🛠😎

    Poništi
  17. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  18. 28. sij

    Discounted prices are available. Check them out!!

    Poništi
  19. proslijedio/la je Tweet
    27. sij

    Just published a blog on INTEL-SA-00329 concerning L1D Eviction Sampling. This vulnerability has little to no impact in virtual environments that have applied L1 Terminal Fault mitigations.

    Poništi
  20. proslijedio/la je Tweet
    27. sij

    I created this repo for the people who want to learn about windows logical privilege escalation bugs. You can contact me to add good article which I missed.

    Poništi
  21. proslijedio/la je Tweet
    26. sij

    Happy 71st from सारे जहॉं से अच्छा! 🇮🇳

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·